Cyber Conflict as an Emergent Social Phenomenon

Cyber Conflict as an Emergent Social Phenomenon

Dorothy E. Denning
DOI: 10.4018/978-1-61692-805-6.ch009
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.
Chapter Preview
Top

Introduction

Warfare is inherently social. Soldiers train and operate in units, fighting and dying for each other as much as for their countries. Cyber conflict is also social, but whereas traditional warriors work and socialize in physical settings, cyber warriors operate and relate primarily in virtual space. They communicate electronically and meet in online forums, where they coordinate operations and distribute the software tools and knowledge needed to launch attacks. Their targets are electronic networks, computers, and data.

The Emergence of Cyber Conflict, or Hacking for Political and Social Objectives

Although conflict appears throughout human history, its manifestation in cyberspace is a relatively recent phenomenon. After all, digital computers did not appear until the 1940s, and computer networks until the 1960s. Attacks against computers and the data they held emerged in the late 1950s and early 1960s, but they were perpetrated more for money and revenge than as an instrument of national and international conflict. Typical crimes included bank fraud, embezzlement, information theft, unauthorized use, and vandalism (Parker, 1976). Teenage hacking arrived on the scene in the 1970s, and then grew in the 1980s, as young computer users pursued their desire to explore networks, have fun, and earn bragging rights. By the end of the decade, the single biggest attack on the Internet was a computer worm launched by a college student simply as an experiment. Within this mix of playful hacking and serious computer crime, cyber conflict, or hacking for political and social objectives, emerged, taking root in the 1990s and then blossoming in the 2000s. Now, it accounts for a substantial share of all cyber attacks, as well as some of the highest profile attacks on the Internet, such as the ones perpetrated by patriotic Russian hackers against Estonia in 2007 and Georgia in 2008.

The Hacker Group Phenomenon

From the outset, hackers and cyber criminals have operated in groups. In his examination of early computer-related crime, Donn Parker found that about half of the cases involved collusion, sometimes in groups of six or more (Parker, 1976, p. 51). Youthful hackers met on hacker bulletin boards and formed clubs, one of the earliest and most prestigious being the Legion of Doom (Denning, 1999, p. 49), while serious criminals formed networks to traffic in cyber crime tools and booty, such as stolen credit cards. Today, there are perhaps tens or hundreds of thousands of social networks engaging in cyber attacks. While many of these networks were formed for fun or financial gain, others arose for the purpose of engaging in cyber conflict. Individuals, often already connected through hacker groups or other social networks, came together to hack for a cause.

The Purpose of This Chapter

This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. These networks support a variety of causes in such areas as human and animal rights, globalization, state politics, and international affairs. This chapter examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums. It also describes the relationship, if any, to their governments.

Top

The Nature Of Non-State Networks

Unlike states, non-state networks of cyber soldiers typically operate without the constraints imposed by rigid hierarchies of command and control, formal doctrine, or official rules and procedures. Instead, they operate in loosely-connected networks encouraging and facilitating independent action in support of common objectives--what is sometimes characterized as “leaderless resistance.”

Complete Chapter List

Search this Book:
Reset