International Journal on Criminology Volume 2, Number 1, Spring 2014 | Page 13
International Journal on Criminology - Volume 2 Issue 1 - Spring 2014
The Behavioral Intelligence Paradigm Shift in Fighting
Cyber-Crime: Counter-Measures, Innovation, and
Regulation Issues
Phillipe Baumard
This paper investigates the technological
evolution of cyber-crimes from
its emergence in the early 1980s to
its latest developments in 2013. From this
evolution, we draw implications for doctrines,
policy, innovation, incentives, and
roadmaps as we propose the emergence of
a new “behavioral intelligence” paradigm,
both in the attack and defense arenas.
Cyber-crime refers to the unlawful
use of numeric, electronic, and software
capabilities to misuse, temper, devoid,
destruct, or influence public or private
information systems. Cybernetic and informational
components may not be the
primary target or final outcomes of cyber-crime
campaigns.
The origins of cyber-crime are concomitant
with the pioneering efforts of
technology enthusiasts in exploring the
possibilities offered by technological innovation.
Exploration and autonomous appropriation
are still, to date, a core motivation
in the creation of “hacks”. John Draper
was one of these computer enthusiasts who
helped popularize the first “phreaking”
hack, consisting of a multi-frequency tone
generator, later known as the Blue Box to
pitch the exact 2600 Hz frequency to hack
into the long distance phone system of
AT&T in the early 1970s.
Most of the early attacks were spontaneous,
motivated by technology exploration,
non-directed (without a specific
target in mind), and immediate in their
effects. With the rise of personal computers,
these early pioneers of hacking started
to group in spontaneous associations,
espousing discourses of the times on individual
freedom, resistance to authority,
and amusement with detours of emerging
technologies. Phreaking and hacking became
both shared practices that cemented
long friendships between developers, industry
pioneers (Wozniak, Jobs, etc.), and
politically motivated technology enthusiasts.
The borders between an emerging
underground culture (yippies and hackers)
and a criminal sub-culture were blurry
and unstable, with very little self-regulation,
and comprising teenagers, advanced
computer developers, and self-taught
technology explorers. We call this era the
“code breaking years”, where talented individuals
are mostly motivated by symbolic
and small gains, a feeling of belonging
to a new community and self-identity.
However, in the mid-1980s, technical
bulletin boards from hackers’ groups
started to disclose attack guidelines for
intrusions, sometimes both physical and
code-based (such as the first issue of the
Legion of Doom LOD/H Technical Journal,
on Jan. 1, 1987 ). LOD and MOD (Masters
of Deception) hence became influential in
transforming these early movements into
more organized “cracking” communities,
moving a step away from the original hacking
culture (see Figure 1).
A
Professor, Ecole Polytechnique, Chair Innovation and Regulation of Numerical Services
1
http://www.textfiles.com/magazines/LOD/lod-1
11