TITLE

Cyberwarfare and Anonymity

AUTHOR(S)
Perr, Christopher
PUB. DATE
January 2011
SOURCE
Proceedings of the International Conference on Information Warfa;2011, p207
SOURCE TYPE
Conference Proceeding
DOC. TYPE
Article
ABSTRACT
Public policy and strategy do not keep up to date with technology. There is generally a lag time between the release and application of a technology till a shortcoming is observed. Once a shortcoming is revealed it is a race to address that potential weakness with improved policy, updated strategy, a technological initiative to combat the shortcoming, or a necessary combination of all methods. The invent of computer reliant and networked systems has created a modern arms race which has seen more innovation and more need for updated policy and strategy than any other period in history, yet the United States continues to fall behind in this arms race. When security cannot be verified, but only risk mitigated, it is time to think deterrence. Unfortunately, deterrence falls apart when you cannot identify the perpetrator behind attacks. This paper will look at the role that information has played in previous conflicts, as well as the modern strategy towards protecting the United States in cyberspace, and will draw a singular conclusion as to the best course of action towards improving our security. Through a mix of policy, strategy, and technology the anonymity which attackers use as a shield needs to be eliminated in order to allow room for a strong policy of deterrence with a verifiable response. In establishing the means to identify our attackers and provide serious recourse cybersecurity can be greatly improved for the United States.
ACCESSION #
60146025

 

Related Articles

  • Catch me if you can: Cyber Anonymity. Rohret, David; Kraft, Michael // Proceedings of the International Conference on Information Warfa;2011, p213 

    Advances in network security and litigation have empowered and enabled corporations to conduct Internet and desktop surveillance on their employees to increase productivity and their customers to gain valuable marketing data. Governments have spent billions to monitor cyberspace and have entered...

  • International Legal Issues and Approaches Regarding Information Warfare. Nitu, Alexandru // Proceedings of the International Conference on Information Warfa;2011, p200 

    In present times, societies and economies increasingly rely on electronic communications, becoming more vulnerable to threats from cyberspace. At the same time, states' military and intelligence organizations are increasingly developing the capability to attack and defend computer systems. The...

  • Neutrality in the Context of Cyberwar. Ryan, Julie; Ryan, Daniel // Proceedings of the International Conference on Information Warfa;2011, p221 

    This paper will examine the legal antecedents of the concepts of neutrality and current enforceability of declarations of neutrality in the context of information operations amongst belligerents. This is a non-trivial point of understanding, given the potential for belligerents to use and abuse...

  • Changing the Face of Cyber Warfare with International Cyber Defense Collaboration. Grobler, Marthie; van Vuuren, Joey Jansen; Zaaiman, Jannie // Proceedings of the International Conference on Information Warfa;2011, p92 

    The international scope of the internet and global reach of technological usage requires the South African legislative system to address issues related to the application and implementation of international legislation. However, legislation in cyberspace is rather complex since the technological...

  • Using Dynamic Addressing for a Moving Target Defense. Groat, Stephen; Dunlop, Matthew; Marchany, Randy; Tront, Joseph // Proceedings of the International Conference on Information Warfa;2011, p84 

    Static network addressing allows for attackers to geographically track hosts and launch network attacks. While technologies such as DHCP claim dynamic addressing, the majority of network addresses currently deployed are static for at least a session. Dynamic addresses, changing multiple times...

  • Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Hutchins, Eric; Cloppert, Michael; Amin, Rohan // Proceedings of the International Conference on Information Warfa;2011, p113 

    Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has...

  • The Hidden Grand Narrative of Western Military Policy: A Linguistic Analysis of American Strategic Communication. Jantunen, Saara; Huhtinen, Aki-Mauri // Proceedings of the International Conference on Information Warfa;2011, p126 

    War engages civilians in a very different way than is traditionally understood. The military-industrial complex has rooted itself permanently into the civilian world. In the US, recruiters have long operated in university campuses, the Pentagon has funded the entertainment industry for decades,...

  • Host-Based Data Exfiltration Detection via System Call Sequences. Jewell, Brian; Beaver, Justin // Proceedings of the International Conference on Information Warfa;2011, p134 

    The host-based detection of malicious data exfiltration activities is currently a sparse area of research and mostly limited to methods that analyze network traffic or signature based detection methods that target specific processes. In this paper we explore an alternative method to host-based...

  • Detection of YASS Using Calibration by Motion Estimation. Kancherla, Kesav; Mukkamala, Srinivas // Proceedings of the International Conference on Information Warfa;2011, p143 

    Through this paper we propose a new approach to thwart defects of current blind steganalysis methods. "Yet Another Steganographic Scheme" (YASS) is a robust steganographic scheme that embeds data in random locations based on a secret key. Due to this randomization the current steganalysis...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics