2012 Crackdown on Hackers and Cyber Criminals

Handcuffs.jpgA number of high profile takedowns, arrests, and prosecutions have occurred throughout the year.  As I predicted for 2012, we have witnessed a tremendous amount of pressure towards the people behind computer attacks.  More focus is being placed on interdicting and removing the threat-agents, the term for archetypes of attackers, instead of just addressing the vulnerabilities exploited by their attacks.  Targeting the culprits behind computer attacks effectively cures the root cause instead of just treating symptoms.   Individuals and groups were pursued by law enforcement agencies, security firms, and internal response teams worldwide.  It is emerging as an effective and necessary practice which continues to gain momentum.

Recently, US Justice Department officials announced they will pursue criminal charges against threat agents sponsored by other nations.  This is huge.  It will expand the scope and depth of worthwhile investigations in areas holding the greatest potential for loss.  Although laws have been in place since 1996 to protect from economic espionage, it has largely been ignored, partly due to the difficulty of proving foreign government collusion, political ramifications, and also due to the complexities of presenting a solid legal case. 

With sufficient numbers of properly trained prosecutors, it may be possible to bring enough cases to into public view to have a sufficient impact and drive change.  Optimally, public awareness and support is critical to address political hurdles and approve necessary funding for future prosecutions.  Knowledge by current or prospective threat-agents promotes deterrence and a stigma of wrongdoing for those who are impressionable and may see such activities as attractive.  Lastly, successes in prosecution will show other regional and international law enforcement agencies that this is a problem which can and should be tackled.  With a growing list of successful cases, it promotes the necessary legal infrastructure and expertise to make the process more efficient.  All this adds to a stronger capability to remove the elite and upcoming talent who choose to leverage technology in malicious ways at the detriment of others.    

Here are some of my favorite cases for 2012:

This is just the start.  Expect this list to grow significantly in 2013.  I am confident as more pressure is exerted on cyber criminals, the threat landscape will thin thus allowing for resources to target those who adapt and attempt to cause the greatest harm.  It is the normal cycle of criminals, technology, and justice.  I can’t wait to see what interesting prosecution holds for 2013.

Published on Categories Archive
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.