International Journal on Criminology Volume 2, Number 1, Spring 2014 | Page 15
The Behavioral Intelligence Paradigm in Fighting Cyber-Crime
The Cold War and the underground
battle for a free Berlin played a determinant
role in the evolution of the hacking
culture of the late 1980s. The Clifford Stoll
episode (an LBL astronomer who accidentally
discovered a computer intrusion from
West Germany in his laboratory) was the
first case to raise the importance of agency
coordination and the difficulties of attribution
in international computer attacks
(Stoll 1989). This case is also one of the
early symptoms (1986) of yet to come advanced
persistent threats, highlighting the
complexity and sophistication of intrusion
campaigns (for details see Stoll’s article,
1988 2 ).
The early 1990s are hence concomitant
with the emergence of the criminal
sub-culture of hacking. In the 1980s, cracking
events that led to theft or large-scale attacks
were rare. Two notable exceptions are
the 1986 Pak Brain logic bomb, known as
the first virus, and the 1982 First National
Bank of Chicago computer theft ($70 M
USD). The “Great Hacker War” (conflict
between Masters of Deception and Legion
of Doom, circa 1991–1992) is an example—today
disputed as an exaggeration of
trivial confrontations—of the interpersonal
dynamics of the early 1990s. A blend of
prestige seeking, bravados, and playfulness
were the core incentives of these early confrontations
3 . The publication of exploits by
hackers’ groups triggered, however, the interest
of Law enforcement. Operation Sundevil,
in 1990, was hence the first large-scale
cyber-enforcement operation, involving
15 U.S. cities and leading to three arrests 4 .
Most cyber-crimes involved wire-tapping,
calling card fraud, and credit card fraud.
The relative failure of this operation led to
an increased awareness of the central role
of cyber-deterrence for federal agencies
(Sterling 1994).
Publications such as 2600 and the
rise of the cyber-space participate in a democratization
of cracking, phreaking, and
hacking techniques, which render them
more versatile to their use “beyond technology”.
Focus on distant control, resident
threats (democratization of Trojans) creates
both a more organized criminal sub-culture,
and the birth of a societal reach for the
attacks (see Figure 2).
While attack preparation is targeted
to single point of aggression, the early
2000s is adopting a whole new dynamic.
The rise of electronic commerce means a
better monetization of cyber-crime with an
expectation of large-scale profits for organized
crime. The digitalization of the cultural
industry (MP3s) creates an appeal for
the popular growth of cracking. Profiles of
hackers accordingly change in two directions:
on the one hand, amateur crackers
(script kiddies and mass market consumers)
start to use without advanced knowledge
available tools (P2P file sharing and
cracking “CDs”). On the other hand, malware
production becomes a profitable black
market. Corruption of DNS paths, denial-of-service
attacks, defacing campaigns,
and corporate thefts find a rapid monetization.
The years 2000–2002 are among
the most active in malware generation with
viruses such as ILOVEYOU, Klez.h., Code
Red, etc. The group Anonymous is created
in 2003 as a loosely coupled and spontaneous
coordination of various interests,
ranging from militant activism, cracking
2
http://pdf.textfiles.com/academics/wilyhacker.pdf
3
http://www.textfiles.com/hacking/modbook4.txt
4
Anthony Lawrence Clapes, Softwars: The Legal Battles for Control of the Global Software Industry. (Westport,
CT: Quorum Books, 1993).
13