International Journal on Criminology Volume 2, Number 1, Spring 2014 | Page 21
The Behavioral Intelligence Paradigm in Fighting Cyber-Crime
Finally, “Social order” doctrines (Class I)
and “Technocratic” doctrines (Class II) only
differ in their perception of control. The
main difference lies in a control at the source
(I) versus a control by a normalization of the
outputs (II). Technocratic perspectives often
suffer from a delayed perception of technological
change, mainly inspired by an incident-response
philosophy or a late entry to
the field. Doctrines that favor social order
generally suffer from a lack of national vision
or national strategy, or have built their
policies by borrowing (or aligning to) external
national visions.
The following graph presents the positioning
of different national cyber-crime
deterrence and cyber-defense strategies
(year indicates date of first document analyzed).
The findings illustrate the trade-off
between national policies that focused on
organized cyber-crime and policies driven
by the surveillance (or the support) of the
societal rooting of cyber-developments. Interestingly,
the Russian cyber-doctrine is
closer to emergent societal developments
than its Chinese or U.S. counterparts.
Measuring the robustness of national
strategies: what to expect?
Most of the studied national strategies
derive their national cyber
criminality deterrence with an
average delay of 10–15 years with the advancement
of technology. Accordingly, society-wide
disruptions have been systematically
overlooked. Typically, cyber-policies
grow in the fxourth class, while the most
disruptive change is taking place in the third.
Core hacking technologies have
been steadily stable in the 1990–2012 period.
Advanced Persistent Threats (APTs) are
not per se the result of a disruption in core
exploits, but rather a paradigmatic change
coming from peripheral technologies
(mainly machine learning, automation, and
combinatory reconfiguration). Such a paradigmatic
change thrives on the obsolescence
of an aging infrastructure. Combinations
are made possible when flaws can be exploited
cross-systems. The growing interoperability
of vulnerable systems increases the
probability of the on-the-fly exploitation
of cross-vulnerabilities. In such a context,
vendors, by pushing cyber-criminality deterrence
to focus on “points of access” vulnerability
assessment impede investment
in behavioral learning technologies (by
maintaining a poorly performing, but highly
profitable, signature-based defense paradigm).
The only way to counteract and deter
intelligent behaviors is by outpacing and
outsmarting its behavioral intelligence. Very
few studied doctrines have acknowledged
this core systemic vulnerability. Confidence
building and security measures (CBSMs) are
hence rooted in a technological and societal
understanding that may foster vulnerabilities,
and suffer from a critical blind spot on
the nature of future technological threats.
Technocratic (Class II) and social
order (Class I) national doctrines are
dependent on vertical and jurisdictional
knowledge, while the evolution of threats is
horizontal and a-jurisdictional. Most recent
large-scale campaigns (APT1, Blaster-worm,
etc.) have shown the limits of inter-jurisdictional
coordination in responding to attacks
with unpredictable attribution, unknown or
undiscovered signatures, and using causative
learning to adapt to common technical
responses.
Most of the analyzed doctrines presented
an outdated perception of authorship
and attribution. Attribution is assimilated in
most doctrines with a geographical point of
emission (or several), a central intent, and a
legalist perspective on tracking back attacks.
19