Cybercrime attacks and identification of actors

Given the nature of the cyber space, although the allocation of a set of malicious acts to a particular actor appears to be quite complex, there are many elements that allow cybercriminals to run.

Geo-strategic texture and technical texture can facilitate the assignment of hostile acts to responsible actors: for example, in a cybercrime attack on Estonia, although the official Russian services did not directly operate to neutralize the servers of the country, but consider It appears that Russia has played a significant role in the attack. Of course, it can not be said that this is the only decisive factor in identifying an actor, since in some cases many actors may be suspected of carrying out an attack, or that even actors may be attacked and try to act as a third party actor. Accused It may even be possible for a government to take responsibility for cyberattacks against its rival to increase its containment position.

In some circumstances, a state that has used the infrastructure and equipment used to commit malicious acts is also responsible for and charged. Thus, in countries where there are no judicial authorities to identify prosecution of cybercrime or cybercriminals, some actions cause them to be identified as responsible or collaborators of a cyber invasion. In this way, governments, as well as groups providing hacker refuge services or facilitating their operations in an attack, can be held responsible.

Also, governments refusing to cooperate in carrying out criminal investigations on their territory are also partly responsible for the attack. In fact, in some cyber attacks, we find that some malicious acts do not occur without participation, support, tacit consent, or even lack of corrective / preventive measures by governments.

In some cases, even if there are many indications regarding the participation of actors in an attack, it is difficult to provide documentary evidence to accuse them; and this uncertainty makes the adoption of preventive countermeasures extremely sensitive.

But by expanding the concept of “multinational response”, this problem can be addressed. This concept is:

– Increase the capabilities of the analysis and investigation of the attack, through the synergy between state-owned technical equipment and the expansion of judicial and military cooperation.

– Achieving a common right to condemn a hostile act and its possible writer – governments and non-governmental groups – through the creation of a unified vote, which is based on unprocessed joint evidence.

Governments and member organizations of this multinational system can rely on this solution to a certain level of cyber-deterrence. In addition, if the participants in this system define the necessity of imposing compulsory or punitive measures, its deterrence will increase sharply.

Joseph Snee in his book, Cyber Power, cited this special dimension of cybercrime: “Since false flags are not complete, rumors of the source of cyber attacks seem to be valid.” (Although it is not measurable in a court of law), the damage done to the soft power of a cyber attacker can contribute to deterring attacks. ”

The actor’s reputation in cyberspace is particularly valuable in comparison to other environments. Many online actors are known by their internet users because of their reputation (honesty, competence, access to reliable information, independence, etc.) and have many followers. The opinions expressed, the analyses provided and the information provided by these actors, are relatively reliable given their positive or negative reputation.

In fact, the reputation of governments, real people and legal people on the Internet creates a real cyber identity, which is achieved through the familiarity of classical interactions. Cyberspace cybercrime is more cumbersome and more volatile than virtual space.

Companies, for example, are placed against actors who are often not well-known, who can publish them on the Internet using simple materials related to their products, products or partners.

In fact, it is a serious challenge to be charged with casting cybercrime. In the same vein, blow to credit can be a means of deterring them from participating in a malicious act.

Sajad Abedi
Sajad Abedi
National Security and Defense Think Tank