Great perspectives in this and something that we should consider ... what do others think ? When Should U.S. Cyber Command Take Down Criminal Botnets? - Lawfare (lawfareblog.com)

As I thought abut the message in this article, I was struck by the author’s assertion that the US Cyber Command should not be involved in combating cyber-criminal activity. There have been very few incidents of known domestically originating cyber-criminal activity on the same scale as cyber-criminal activity originating in foreign countries and conducted by foreign powers. It is very clear that North Korea, China, Iran, and Russia are supporting “gangs” that perpetrate cyber-criminal activity, most notably advanced ransomware. Cyber criminal activity that often includes the support of government agencies engaged in similar cyber crime activity. The author further asserts that it is simply not in the model of U.S. civil-military relations to allow the military to have such far-reaching cyber powers. The author’s assertion is a reference to a physical conflict paradigm that has dramatically shifted to cybercriminal activity as a proxy for outright physical confrontation. Since the US military is charged with the safety of the US, and the safety of the US is increasingly challenged electronically, it is a reasonable conclusion that the US Cyber Command indeed should be involved in combating cyber criminal activity. Especially considering that the majority of cyber criminal activity is sponsored by known foreign powers. But I think the most troublesome assertion is that cyber scams may be imminent but are rarely severe, and that using the U.S. military against scams will usually be neither efficient nor intelligent. The Colonial Pipeline cyber-attack crossed the line from a troublesome scam to a severe cyber-attack. Cyber-attacks like that perpetrated on the Colonial Pipeline will only continue and become increasingly severe. It is becoming increasingly clear that the US Cyber Command is the best suited agency, either public or private, to deal with cyber-attacks AND cyber-criminal activity.  Especially those attacks originating from known foreign powers.

Anonymous Author
As I thought abut the message in this article, I was struck by the author’s assertion that the US Cyber Command should not be involved in combating cyber-criminal activity. There have been very few incidents of known domestically originating cyber-criminal activity on the same scale as cyber-criminal activity originating in foreign countries and conducted by foreign powers. It is very clear that North Korea, China, Iran, and Russia are supporting “gangs” that perpetrate cyber-criminal activity, most notably advanced ransomware. Cyber criminal activity that often includes the support of government agencies engaged in similar cyber crime activity. The author further asserts that it is simply not in the model of U.S. civil-military relations to allow the military to have such far-reaching cyber powers. The author’s assertion is a reference to a physical conflict paradigm that has dramatically shifted to cybercriminal activity as a proxy for outright physical confrontation. Since the US military is charged with the safety of the US, and the safety of the US is increasingly challenged electronically, it is a reasonable conclusion that the US Cyber Command indeed should be involved in combating cyber criminal activity. Especially considering that the majority of cyber criminal activity is sponsored by known foreign powers. But I think the most troublesome assertion is that cyber scams may be imminent but are rarely severe, and that using the U.S. military against scams will usually be neither efficient nor intelligent. The Colonial Pipeline cyber-attack crossed the line from a troublesome scam to a severe cyber-attack. Cyber-attacks like that perpetrated on the Colonial Pipeline will only continue and become increasingly severe. It is becoming increasingly clear that the US Cyber Command is the best suited agency, either public or private, to deal with cyber-attacks AND cyber-criminal activity.  Especially those attacks originating from known foreign powers.
2 upvotes