International Journal on Criminology Volume 2, Number 1, Spring 2014 | Page 17
The Behavioral Intelligence Paradigm in Fighting Cyber-Crime
techniques sharing, and image sharing
around the 4chan platform. Massive raids
and pranks, known as “4chan raids”, popularize
a perspective of hacking as a blend of
activism, bullying, and satirist information
campaigns, although opting out of political
campaigns in the early years (2003–2006).
Meanwhile, preparation and sponsorship
of large-scale attacks also gain considerable
traction as the core philosophy of
hacking (based on freedom and activism
values) is fading away with the diffusion
of embedded cracking tools and libraries.
Titan Rain (2003–2006) is an exemplar of
these first explorations of cyber-warfare involving
low-tech methodologies embedded
into advanced campaigns (see Figure 3).
The years 2005–2013 are marked by
a double shift, and to some extent a seizure,
between “target and sponsored campaigns”
led by States or organized crime, and more
pervasive “spontaneous and long-reach
campaigns” led by activist groups, hackers’
collectives, and loosely coupled entities
such as Anonymous and LulzSec. This period
is characterized by a rapid growth of
strategic and politically motivated attacks
(Kerem125 against the United Nations,
Chinese APT1 global campaign, Estonia
DoS attacks, Stuxnet, and Operation Aurora)
(Figure 4).
The technology used in these largescale
campaigns does not dramatically
differ from the early days of hacking. One
hundred and twenty-five lines of codes are
still very efficient in 2013 to conduct the exploitation
of vulnerabilities, even when the
lines of defense have exponentially grown
in the past 25 years. As most innovation
disruptions in the early twenty-first century,
the performance of these campaigns is
rooted in the accessibility and diffusion of
combinatory learning, i.e., the capacity of
outpacing the defensive learning of targets
by a better and faster behavioral intelligence.
The formation of two distinctive
groups (large-scale spontaneous groups
versus sponsored targeted large-scale campaigns)
is typical of the two paths that can
be used to attain a superior collective behavioral
learning advantage. Large spontaneous
groups benefit from distributed
astute learning, i.e., the learning conducted
by individual hackers who can coordinate
on a very large scale, making their collective
learning ubiquitous and efficient. Targeted
sponsored campaigns (such as APTs)
benefit from the advance of automated artificial
intelligence embedded into technology
(e.g., Stuxnet and FLAME).
Most defensive systems are based on
the recognition of signatures (“embedded
malicious codes”) of malwares, or on the
normative analysis of behaviors compared
to “healthy behaviors” (knowledge-based
detection systems). Both the collective
learning of spontaneous groups and advanced
machine learning currently outpace
signature-based detection systems. The
nature of the current paradigm shift is, in
this sense, very similar to the evolution of
information warfare in the early 1990s. We
are witnessing a strategic disruption where
defenders are consolidating their information
infrastructures, while attackers are
engaging in knowledge-warfare (Baumard
1994). Superior knowledge, through astute
combination, can be gained from truncated
and partial information. Superior information
rarely defeats even poorly articulated
knowledge.
A behavioral intelligence paradigm
is synonymous with an inescapable rise of
“zero days” threats. Pervasive and highly
available combinatory learning allows
the creation of many variants of an exploit
(exploitation of a vulnerability) within 24
hours of its discovery. Re-encapsulating
and re-combining the exploits of undiscovered
flaws (“zero days”) is made possible
15