New Pirates, Old Solutions: An 18 th Century Approach to Cybercrime

Similar documents
Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

The United Nations study on fraud and the criminal misuse and falsification of identity

The Strategic Significance of the Internet Commons

PERTH COUNTER-PIRACY CONFERENCE JULY 2012 CHAIRMAN S FINAL STATEMENT OF THE MEETING

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Following the Money to Combat Terrorism, Crime and Corruption

Revealing the true cost of financial crime Focus on the Middle East and North Africa

Global View Assessments Winter 2016

British imperial expansion and the transformation of violence at sea, : introduction

Finland's response

Results of regional projects under the Council of Europe/European Union Partnership for Good Governance 1

Thailand s Contribution to the Regional Security By Captain Chusak Chupaitoon

Next- Generation National Security and Public Safety in Europe

JOINT STATEMENT OF THE ASEAN-AUSTRALIA SPECIAL SUMMIT: THE SYDNEY DECLARATION. Sydney, Australia, 18 March 2018

Canada and Israel Strategic Partnership (22 January 2014)

Intelligence brief 19 March 2014

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union

CONVENTIONAL WARS: EMERGING PERSPECTIVE

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

Third Session ROYAL MOROCCAN NAVY: NEW PERSPECTIVES FOR BETTER MARITIME SECURITY AWARENESS" Captain Abdelkrim MAALOUF

BENEFITS OF THE CANADA-EU STRATEGIC PARTNERSHIP AGREEMENT (SPA)

Closed for Repairs? Rebuilding the Transatlantic Bridge. by Richard Cohen

Council of the European Union Brussels, 14 September 2017 (OR. en)

Annex. Twelfth United Nations Congress on Crime Prevention and Criminal Justice

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

Twelfth United Nations Congress on Crime Prevention and Criminal Justice

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

Council of the European Union Brussels, 23 January 2015 (OR. fr)

G7 Foreign Ministers Declaration on Maritime Security Lübeck, 15 April 2015

Social Studies Content Expectations

Executive Summary. The ASD Policy Blueprint for Countering Authoritarian Interference in Democracies. By Jamie Fly, Laura Rosenberger, and David Salvo

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

Resolution adopted by the General Assembly on 21 December [on the report of the Third Committee (A/65/457)]

TURKEY Check Against Delivery. Statement by H.E. Sebahattin ÖZTÜRK Minister of Interior / Republic of Turkey

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

TRANSNATIONAL CRIME. An International Law Enforcement Collaboration

Speech by Minister of Defense Inada at IRSEM (The Institute for Strategic Research)

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Pirates. Peter T. Leeson

Legal Alert? December 2013? Cyber Security, Risks and Crimes In this Issue:- 1. Legal Alert? December 2013? Cyber Security, Risks and Crimes 2.

S/2001/1326. Security Council. United Nations

PC.DEL/764/08 15 September ENGLISH only

Proposal for a draft United Nations Statute on an International Criminal Court or Tribunal for Cyberspace (Second Edition May 2013) Introduction

CAC/COSP/IRG/2011/CRP.4

FINAL WORKING DOCUMENT

Contemporary maritime pressures and their implications for naval force structure planning

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

ASEAN Regional Forum. Work Plan for Counter Terrorism. and Transnational Crime

Conférence Benelux Cybersecurity Maastricht, 5 avril 2011 Intervention de Monsieur le Ministre François Biltgen

Debating privacy and ICT

S/2001/1309. Security Council. United Nations

Title of Presentation. Global Threat Brief President / CEO Global Guardian

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

SUMMARY REPORT OF THE NINTH ASEAN REGIONAL FORUM SECURITY POLICY CONFERENCE PHNOM PENH, CAMBODIA, 25 MAY 2012

EU-India relations post-lisbon: cooperation in a changing world New Delhi, 23 June 2010

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

JOINT INVESTIGATION TEAMS: BASIC IDEAS, RELEVANT LEGAL INSTRUMENTS AND FIRST EXPERIENCES IN EUROPE

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

THE FEDERALIST ERA, : FOREIGN POLICY

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger*

National Report Japan

Hearing on the U.S. Rebalance to Asia

The EU fight against piracy in the Horn of Africa

Black smoke once again looms on the Iraqi horizon as a Middle Eastern

The Opium Wars and their Impact

Thirteenth United Nations Congress on Crime Prevention and Criminal Justice

Journal of Conflict Transformation & Security

OSO Political Science 2014.xlsx

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005.

Issue: Strengthening measures regarding international security as a way of combating transnational organized crimes

CONFERENCE BACKGROUND GUIDE

The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law

WHY WE ARE REVIEWING THE ACT

COUNCIL OF EUROPE AND THE INTERNET

Hacking and the Law. John MacKenzie

FIFTH MEETING OF MINISTERS OF JUSTICE OR OF MINISTERS OR ATTORNEYS GENERAL REMJA-V/doc.7/04 rev. 4 OF THE AMERICAS 30 April 2004

Question 1: The Distribution of Authority in Cyberspace

CHINA IN THE WORLD PODCAST. Host: Paul Haenle Guest: Wang Yizhou

M. Taylor Fravel Statement of Research (September 2011)

Addis Abeba International Conference. Italian Experience and Framework on Asset Recovery in Fighting and Cracking Down Organized Crime and Corruption

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

Joint Statement of the 22 nd EU-ASEAN Ministerial Meeting Brussels, Belgium, 21 January 2019

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations

OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM

New Brunswick s International Strategy. Department of Intergovernmental Affairs

TST Issue Brief: Global Governance 1. a) The role of the UN and its entities in global governance for sustainable development

Trafficking in Persons. The USAID Strategy for Response

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9

Small Arms. Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects

(OJ L 164, , p. 3)

Delegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.

Draft Accra Declaration

Protecting Human Rights and National Security in the New Era of Data Nationalism

Trends in transnational crime routes

Collaboration Amidst Complexity: Enhancing Jointness in Canada s Defence Instrument. by Doug Dempster

Panel 2: National Data Governance in a Global Economy

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

Transcription:

Independent Student Journal: International Relations 2018 Vol 1 pp 59-69 New Pirates, Old Solutions: An 18 th Century Approach to Cybercrime AUTHOR Filip Norén ABSTRACT Various authors on cybersecurity have compared cyberspace to the high seas and suggested that states should contract privateers, in the form of private corporations or individuals, in order to bolster their defensive and offensive capabilities in cyberspace. This conceptual paper explores the high seas-cyberspace analogy and evaluates the extent to which it can strategically inform the battle against cybercrime. It is argued that the historical battle against piracy, characterized by its emphasis on legal frameworks, the removal of market support structures, and states use of privateers, offers limited lessons with regard to cybercrime. The analogy suggests that strategies against cybercrime should stress the usefulness of existing legal structures and earmark additional resources for them, while also prioritizing the establishing of specialized cybercrime courts and the hiring of former cybercriminals. Moreover, the comparison between piracy and cybercrime suggests that cybercrime should be treated as a socio-economic problem, while the historical use of privateers can be reimagined as cyber-privateering to potentially construct a new model of cyberdeterrence. Correspondence Address Filip Norén, MSc Student, University of Leiden, Netherlands. Email: n.f.noren@umail.leidenuniv.nl INTRODUCTION A t a glance, the high seas and the Internet seem to have little in common, perhaps except the fact that the Internet works through undersea cables. However, they share significantly more since both domains are vast and partially ungoverned, yet critical for trade and communication. Many cybersecurity issues come with a high seas counterpart. Singer and Friedman, in their book Cybersecurity and Cyberwar: What Everyone Needs to Know, suggest that the way in which piracy and privateering were managed historically provides an instructive parallel to explore for cybersecurity today (2014, p. 178). This paper uses Singer and Friedman s mention as its foundation, exploring in the first section various aspects of the analogy. Most literature that uses it focuses on privateering as a means to bridge public-private divides, whereas this paper targets piracy and cybercrime. In the second section, the measures that were key in ending the so-called Golden Age of Piracy will be examined through a limited historical investigation. In the third section, the two preceding sections are tied together to identify strategic aspects in which the present-day battle against cybercrime can be bolstered by insights from the fight against piracy. As such, this is a conceptual paper that explores the extent to which the successful battle against piracy on the high seas might be translated into the 21 st century to combat cybercrime. THE HIGH SEAS-CYBERSPACE ANALOGY Pirates and Privateers - Then and Now It is customary by now for authors on cybersecurity to bring up increased engagement with, and by, the private sector as a solution to cyberinsecurity (Singer and Friedman, 2014). 1 In 1 Regardless of an author s specific purpose, be it financial cybercrime, cyberwarfare, cyberdefense, and so on, they tend to recommend better leveraging of private sector knowledge for public gain. See, for 59

Independent Student Journal 2018: International Relations doing so, they are typically concerned with avoiding a Wild West of cyberattacks, a scenario that is colorfully captured in the free-forall that sometimes characterized the Golden Age of Piracy (Garrett, 2013). Given the centrality to the analogy of private actors, it is necessary to delineate what privateers were in the historical, seaborne sense. Privateers commonly were private actors using their own resources and ships to attack merchant shipping and relied on letters of marque and reprisal for doing so (Spearin, 2014, p. 99). Other scholars define privateering simply as state-sanctioned piracy (Boot, 2009, p. 96). Indeed, as we will see in section two, privateering did not differ from piracy in the substantive nature of the conduct, but only in the attendant formalities (Kontorovich, 2004, p. 214). Singer and Friedman point to the similarities between privateers and patriotic hackers (Singer and Friedman, p. 177; see also pp. 110-114). Both groups are licensed, explicitly or tacitly 2, to act on behalf of the state without being a formal part of it. Privateers can also be analogous to private cybersecurity actors contracted by state agencies, such as America s National Security Agency (NSA), to bolster cyber (military) forces. In other words, cyber-privateers collectively represent both state-sanctioned pirates and patriotic hackers. Like privateers at sea, much of the value of cyber-privateers rests with the difficulty of successful attribution, the identification of the source or organizer behind an attack. The port blockades that pirates and privateers operated effectively correspond to DDoS attacks. 3 Similarly, acts of theft and hijacking essentially correspond to today s data breaches affecting corporations and individuals. Lastly, both the privateers and pirates of old and today s cyber criminals attack economic infrastructure and military assets (Singer and example, Zarate (2015), Mazanec and Thayer (2015), and Hoffman and Levite (2017). 2 ) While there is little evidence that the Russian government carried out the 2008 electronic attacks on Georgia, researchers put more faith in the notion that the Kremlin discreetly encouraged malicious actions by seeding instructions on Russian hacker and nationalist forums (Deibert et al., 2012, p. 16). 3 Distributed Denial of Service (DDoS) attacks are coordinated attacks using large numbers of compromised machines. Their main purpose is to overload websites and servers such that victims cannot provide services to legitimate users. See Hoque, Kashyap and Bhattacharyya (2017). Friedman, 2014, p.177). For instance, hackers hijacked online client operations at Banrisul, a major Brazilian bank, in 2017, stealing clients credentials (Lynch, 2017). By contrast, direct attacks by state actors on economic and military assets are not covered by the analogy herein. An example for comparison is the 2007 Operation Orchard, during which Israeli state forces cyberneutralized Syria s air defenses while fighter jets decimated a Syrian nuclear facility (Makovsky, 2017). The Cyber-Privateering Debate Aside from Singer and Friedman, the concept of privateers in cyberspace is the subject of a limited literature. The term cyber-privateering may have originated with a 2015 report on how the US government could empower financial institutions in the private sector and even private individuals to pursue economic warfare on its behalf (Zarate, p.24). In the US, some suggest that the solution to the problem of cyberattacks can be found in Article I, Section VIII of the Constitution: the Congressional power to grant letters of marque and reprisal (Garrett, 2013; Zarate, 2015; Mazanec and Thayer, 2015; Egloff, 2017). While these authors mainly envision a cyber-privateering regime that bestows private actors with more powerful means of defending themselves in collaboration with governments, others argue that they should be allowed to offer and employ offensive capabilities, including those that governments are currently lacking (CCHS, 2016). Offensive cyber capabilities are often considered the most extreme on a sliding scale of active cyber defense, or ACD, measures (Hoffman and Levite, 2017). 4 Combining rhetoric of more active measures and the high seas-cyberspace analogy, Jeremy and Ariel Rabkin argue that the analogy s merit lies in the grey zone between tension and war: Cyber conflict should be open as naval war has been to hostile measures short of war, to attacks on enemy commerce, to contributions from private auxiliaries (2013, p. 197). 5 4 Rosenzweig (2014) constructs a useful typology concerning the effects of, and the degree to which, measures affect external networks. 5 This is how Russia and China exploit the concept of grey areas of conflict, as they do not see the typically Western, binary understanding of conflict as either a state of peace or a state of war. See, for instance, Neither War nor Peace: The Uses of Constructive Ambiguity, The Economist (2018). 60

Noren New Pirates, Old Solutions A particular topic related to the cyberprivateering debate that has received scholarly attention lately is cyberdeterrence. Some, such as Zarate, argue that more systematic use of private actors working in concert with the government would create a new level of cyberdeterrence (2015, p.25). Private actors possess a majority of the knowledge needed to dependably identify attackers and move from attribution to retribution. The latter corresponds to the more extreme measures within the above-mentioned ACD spectrum. However, Singer and Friedman join others in pointing out that the difficulty in attribution of cyberattacks is a central reason that prevents the direct application of deterrence theory in cyberspace (2014, pp. 136-137; Mazanec and Thayer, 2015). Others have raised the concern that cyberdeterrence may not work as well as nuclear deterrence (Libicki, 2009). Overall, there is a lack of empirical evidence on the prevalence of ACDs and the effectiveness of cyberdeterrence (Hoffman and Levite, 2017). 6 In sum, scholars have employed the high seascyberspace analogy to describe an ecosystem in which states are in need of added capabilities as they interact to varying extents as allies and enemies with private actors. This paper, by contrast, maintains a narrower focus on the usefulness of the high seas-cyberspace analogy at the strategic level against (mainly non-state) cybercriminals. HOW PIRATES WERE DEFEATED ON THE HIGH SEAS Outlined below in their respective sections are the boundaries of the so-called Golden Age of Piracy as discussed in the literature and two major themes of anti-piracy measures: the shutting down of markets and support structures, and the commissioning of privateers to directly target pirates as a complement to state navies. The Golden Age of Piracy from an Academic Perspective The concept of a Golden Age of Piracy is contested by historians in terms of its boundaries in time and space, yet it is useful in understanding the ecosystem in which pirates and privateers were most active. The first systematic use of the term appears to be from 1897, when historian John Fiske held that it may be said to have 6 To the extent that such evidence exists, it is probably to be found in the grey literature. extended from about 1650 to about 1720 (1897, p. 338). While Fiske refers to the greater West Indies and the US Eastern Seaboard, Konstam and Cordingly limit their definition to the Caribbean...from 1714 until 1722, so the true Golden Age cannot even be called a 'golden decade.'" (2005, p. 98). Tellingly, several scholars have revised their definitions at least twice (cf. Rediker, 1981; 2004; Cordingly, 1994; Konstam and Cordingly, 2005). For the purposes of this paper, it is sufficient to note a convergence around Fiske s boundaries as they reappear in more recent works (Botting, 1978; Cordingly, 1994; Rediker, 2004). 7 Since Britain was the major geopolitical power of this era, most examples and references will be made to it, although other powers feature as well. Shutting down markets and support structures The first key theme of counter-piracy success in the past was the shutting down of safe havens by cleaning up markets and removing support structures. The first component of this strategy was the clean-up of incompetent or corrupt officials from positions of power. Two British examples are Governor Nicholas Trott of the Bahamas, deposed in 1696, and Governor Benjamin Fletcher of New York, removed the following year (Boot, p. 98). Another tool was the recruiting of former troublemakers to secure competent leadership. The revolving door between the public and private domains is not a recent phenomenon, in spite of the contemporary woes (Stephenson, 2014). The case of Sir Henry Morgan serves as an example; his activities as a privateer led to his arrest by the British Crown, yet this experience also saw him knighted and sent to Port Royal, Jamaica, as Lt. Governor. 8 He helped the city shed its status as a sanctuary for pirates and their trade, defending it against raids by pirates and French privateers. Similarly, despite the strict legal regime of the Netherlands during the Golden Age, numerous Dutch seamen 7 Rediker s most recent, and most complex, definition of the Golden Age of Piracy consists of three temporal subdivisions, or generations : the buccaneers of 1650 1680, the Indian Ocean pirates of the 1690s, and the pirates of 1716 1726 (2004, p. 8). 8 A non-british example: The French privateer Jean Bart was so effective in attacking Dutch shipping in the late seventeenth century that King Louis XIV ennobled him and gave him a captain's commission in the French navy (Boot, p. 98). 61

Independent Student Journal 2018: International Relations charged with piracy were rehabilitated to serve the state (Lunsford, 2005, p. 141). The second component in the clean-up of power and trading structures was to more firmly establish the rule of law. Authors belonging to a certain strand in the study of history or international law ascribe the decline of piracy to the use of universal jurisdiction for prosecuting pirates (Bassiouni, 2001; Jarvis, 2006). Courts and commentators have misinterpreted jurisdiction [over piracy] as based upon universality because of rhetoric that branded pirates as the enemy of mankind (Garrod, 2014, p. 202). Rather, pirates were the enemies of the State that labelled them as such (Ibid.). Benton clarifies that even when the discourse labelling pirates as the enemies of all mankind emerged in full voice, the mechanisms for controlling piracy under the law remained those of municipal law (Benton, 2011, p. 239). 9 Rather than universal jurisdiction, the critical legal reform was to geographically extend the reach of municipal law to piracy-infested areas. In 1700, Britain s Parliament provided for Vice- Admiralty courts consisting of seven commissioners, typically naval officers as opposed to regular judges. These courts helped speed up prosecutions by convening far afield (Boot, p. 99). Numerous European maritime powers followed suit, implementing decentralization models that enabled their antipiracy campaigns (Ritchie, 1986; Benton, 2011, p.232). 10 As they did so, these powers called upon the principle of universal jurisdiction over piracy as a tool for advancing political interests or imperial expansion, not in its (dubious) legal sense (Kempe, 2010, p. 371; also, see Garrod, 2014). At the receiving end of this invigorated legal regime, it is necessary to acknowledge a more sinister account of history. Rediker surveys primary sources to show how the Atlantic Empires, led by Britain, organized an international campaign of terror to eradicate piracy, using the gallows in highly public displays of power (2004, p. 10). While the maltreatment that sailors suffered at the murderous hands of captains of contemporary ships probably contributed to their decisions to become pirates (Ritchie, 1986; Rediker, 2004, p. 17), Rediker excessively victimizes the pirates as revolutionaries in legitimate pursuit of an egalitarian community. Rather than primarily 9 See also Kontorovich (2004). 10 For a more detailed account, see Benton (2009). being casualties of social class and the mercantilist state, pirates suffered a heavy-handed response because the nascent international (colonial) system depended increasingly on transoceanic trade. 11 The 173 peace treaty at Utrecht caused thousands of unemployed sailors to look for work as pirates. 12 Albeit despicable in humanitarian terms, the crackdown corresponds to the perceived level of threat that pirates posed to core state interests. Enlisting Privateers to Support State Navies The growing dependence among European maritime powers on protected shipping routes to distant parts of their overseas empires resulted in the increased use of, and regulation of, privateers. For instance, the Dutch developed a sophisticated regulatory system for privateers that severely punished violators (Lunsford, 2005). Similarly, the British practiced judicial specialization for privateers, much like in the case of pirates, by setting up specialized prize courts for captured booty (Richard, 2010). The seriousness of this effort was perhaps felt more than anyone by Captain Kidd, who was hanged after seizing vessels in violation of his privateer commission (Ibid.). As the practice of privateering matured, states increased their use of privateers for the specific task of pirate-hunting. For instance, the Bahamas was a pirate rendezvous in 1718, despite being a British colony. Woodes Rogers, a British privateer, was commissioned to reinstate government control, successfully expelling the pirates and fending off the Spanish Navy (Woodard, 2007). In another instance of the revolving door, Rogers was subsequently appointed Governor of the Bahamas and proceeded to disperse many a Caribbean pirate by, in turn, commissioning privateers (Ibid., pp. 284-5). However, the role of privateers in ending the Golden Age of Piracy is often downplayed by authors arguing that states could not develop international norms against piracy and suppress it until privateering was delegitimized (Thomson, 11 Rediker (2004) has illuminating accounts on the particular role of the slave trade in transatlantic commerce as well as in piracy, both of which lie outside the scope of the present argument. 12 The scale of the unemployment among sailors was extensive. For instance, the British Royal Navy reduced its number of sailors by over 36,000 over a period of two years (Rediker, 2004, p. 23). 62

Noren New Pirates, Old Solutions 1994, p. 140). Golden Age Piracy ended a century before privateering was abandoned in the 1856 Paris Declaration Respecting Maritime Law, at least in the West. 13 In the words of Richard, piracy suppression had less to do with delegitimizing privateering and more to do with establishing the rule of law (2010, pp. 436-7). Towards this end, privateers were not alone, but rather complemented regular state navies; together they effectively hunted down pirates (Ibid.). 14 APPLYING 18 TH CENTURY LESSONS TO 21 ST CENTURY PROBLEMS As previously outlined, most authors employ the high seas-cyberspace analogy to argue for issuing letters of marque in order for private entities to defend themselves against cyberthreats. This section aims to apply the strategic lessons from the fight against piracy to the cybercriminal realm such that governments and corporations alike can achieve greater deterrence and chances of prosecution. While authors have created various typologies of cybercrime, there is no universal definition (Chang and Grabosky, 2014). The definition used here is criminal offences specifically related to computers and telecommunications, or crimes that have taken place within cyberspace (Ibid., pp. 322-3). Shutting down cyber safe havens Akin to Golden Age pirates, cybercriminals rely on cryptomarkets to trade technical tools or services needed for cyber attacks, as well as products derived from the loot. 15 The ubiquitous example is the Silk Road, the largest Dark Web market until it was dismantled in 2013, offering cybercrime-as-a-service, credentials, stolen 13 Piracy did reemerge in the early nineteenth century as a result of privateers, notionally supporting independence movements, going rogue The pirate crews, however, were not limited to privateersmen. Former naval personnel, sailors, fishermen, slaves, and criminals all joined pirate companies Peter Earle (2006), The Pirate Wars, (St. Martin's Griffin), p. 211, quoted in Richard, 2010, p. 437. 14 As also argued in more detail by Cordingly (1995, p. 222). 15 The term cryptomarket originated as a colloquial online term, but has also been adopted by academia and refers to an online forum where goods and services are exchanged between parties who use digital encryption to conceal their identities (Martin, 2013, p. 356). Not all transactions on cryptomarkets are illegal. identities, as well as drugs and weapons, etc. 16 Whereas piracy was relatively limited, although with far-reaching political-economic consequences, it is difficult to estimate the extent of cryptomarkets. Pirates themselves estimated that the all-time peak in their global number was 2,400 aboard 30 ships in 1716 (Rediker, 2004, p. 29). A 2014 study suggests the Silk Road was just the tip of the iceberg (Martin, 2013), while a 2016 study using a near-identical definition of cryptomarkets found that about 20 cryptomarkets [were] active (Broséus et al., p. 11). The issue is that it is difficult to estimate how much trading is done on the Deep Web. It is probably substantial, but the impact is softened since access is limited for all but the highly skilled. 17 In addition to markets, cybercriminals rely on disreputable Internet Service Providers, or ISPs, for access to basic Internet infrastructure. 18 The term bulletproof hosting (BPH) captures how these providers enable their customers dubious or illicit activities, sometimes due to incompetence or ethical stances, but mainly for profit. To illustrate the impact of BPH, consider the Rustock botnet. 19 At its peak, it was blamed for about 60 percent of the spam sent daily (Bright, 2011). Its takedown, called Operation b107, was led by Microsoft and involved US federal law enforcement agencies, cybersecurity company FireEye, and the Dutch and Chinese governments (Ibid.). The importance of reducing the number of BPH providers is impossible to overstate as many cybercriminals would not be able to operate without them (Goncharov, 2015). That is because they constitute hideouts, much like physical ports 16 For a detailed, biography-style account of the Silk Road creator, which illustrates the judicial and law enforcement obstacles and dynamics to shutting down a cybercrime marketplace, see Bilton (2017). 17 The Dark Web is a relatively easy-to-access platform containing thousands of websites that hide their IP address through anonymity tools like Tor and I2P. The Deep Web is much larger, more technically demanding, and includes all web spaces that cannot be reached by regular search engines. 18 These providers offering typically include domain hosting, content hosting, or the means to run bot networks. They take highly lenient approaches to the type and legality of content and services that their customers operate. See www.spamhaus.org. 19 A botnet is nothing more than a string of connected computers coordinated together to perform a task (Norton.com, n.d.). The problems start when users machines are hijacked as part of botnets for nefarious purposes. 63

Independent Student Journal 2018: International Relations did for Caribbean pirates before they were brought under imperial control. The historical analogy, as seen in Section 3.2, suggests that governments should impose stricter regulatory control over cryptomarkets and hosting structures, while also recruiting former cybercriminals. It also suggests executing substantial numbers of cybercriminals. 20 Naturally, we can dismiss the latter as morally outdated, not to mention operationally difficult. Regarding stricter regulatory control, the Silk Road and Rustock takedowns exemplify how technical capability in law enforcement is less problematic than commonly imagined (Hayes et al., 2015). 21 Contrary to claims that law enforcement agencies are going dark in the face of technology, law enforcement has much better and more effective surveillance capabilities now than it did [in the Internet s youth] (Abelson et al., 2015, p. 71). In cybercrime, governments problems remain close to those of traditional crime, revolving around clashing national and international jurisdictions, hiring elite cyber forensics investigators, and being able to afford enough of them, according to Europol and Eurojust staff (Hayes et al., 2015). The historic overseas extension of legal regimes such that prosecution could take place where piracy took place cannot be readily applied in cyberspace. Local laws at the national level are already the primary tools for enforcing the rule of law against cybercrime. 22 However, the analogy suggest that the specialization of courts must be accelerated. Like the piracy courts of old, regular judges or juries could be replaced with persons holding deeper knowledge in cybersecurity and cybercrime, who are better suited to evaluate evidence. 23 20 About ten percent of all Golden Age pirates were hanged. See Boot, p. 99. 21 Arguments to the effect that law enforcement must be given encryption backdoors by law are commonly motivated by mass intelligence gathering and surveillance rather than cybercrime per se. See Hayes et al. (2015). 22 Not necessarily under the correct laws, however. Data from the UK Ministry of Justice show that far more people have been sentenced for cyber offences under the Fraud Act than under the Computer Misuse Act 1990 (CMA) between 2007 and 2012. See McGuire and Dowling (2013). 23 Ideas to this effect have been put into practice in drugs courts and have been suggested by commentators using other sources of inspiration than piracy. While federal efforts are lagging behind, some US States have Regarding jurisdictional issues in the international battle against cybercrime, the analogy is less instructive. Britain secured its position as the premier naval power at this time, unilaterally exerting state power as the piracy threat to trade started to outweigh the risk of conflict with (mainly) France, Spain and the Netherlands (Rediker, 2004). In cybercrime, some geopolitical dimensions apply given that BPH operators often choose political hotspots as shields against takedowns. For instance, most BPH operations on the Dark Web operate from Russia, Ukraine or Moldova (Mahjoub and Passwaters, 2017). 24 For jurisdictional reasons, courts cannot touch such operations in unilateral moves similar to historical anti-piracy moves by the British. Also, operators commonly place different customers in different countries according to the type of content they offer (Mahjoub, 2017). These key challenges for governments in combating cybercrime operations can perhaps only be addressed with greater international cooperation, not legal specialization. Hence the piracy analogy fails to explain how a state can create incentives for another to mitigate cybercriminal operations in its territory. 25 The revolving door that propelled privateers Woodes Rogers and Sir Henry Morgan to governorships in the Caribbean translates into the hiring of cybersecurity professionals and even cybercriminals for high-ranking government jobs as investigators and administrators. Associated problems include cultural clashes with government bureaucracy, background checks that take years, and relatively low pay (Peterson, introduced specialized cyber prosecution units, see Pisaric (2017). Malaysia is another example (Habibu, 2016). 24 BPH providers also flourish in ostensibly cleaner jurisdictions. In terms of spam operations originating in their territories, the US and the UK combine to host as many as Russia and China combined because of loose laws, or loose enforcement thereof. See Spamhaus.org. 25 Zarate (2015) proposes drawing inspiration from counterterrorism and anti-money-laundering efforts of the Financial Action Task Force in the cyber realm. If a cyber norms framework was created around the international financial system, ostracizing or barring States that fail to quash domestic actors launching cyberattacks on that system, those norms may be followed. That is because States and bankers would ultimately be guided by self-interest rather than highminded appeals to the law of armed conflict (Zarate, 2015, p. 4). 64

Noren New Pirates, Old Solutions 2015). 26 The persuasive power of the privilege of public service is questionable (Ibid.). Nevertheless, the analogy suggests that the urgency and amount of resources afforded to these recruitment efforts should increase significantly. In sum, the high seas-cyberspace analogy is instructive for issues of court specialization, manpower, and the salience of regular municipal law. It fails to contribute to jurisdictional issues, including how to investigate and prosecute more effectively given that the physical infrastructure of the Internet always lies within the national jurisdiction of some country. Expanding State Capabilities The dynamic of sailor unemployment and use of privateers by states in the Golden Age is illuminating for the cyber realm in several ways. Consider the overrepresentation of Russians in cybercrime. According to Galeotti, Russians account for 35 percent of global cybercrime revenue, but only one percent of the global ICT economy (2011). He attributes this to the fact that a disproportionate number of Russians have world class math and computers skills, yet not the kind of jobs to use them legitimately (Ibid.). 27 There is some empirical evidence to support a correlation between weak economic development and escalating levels of cybercrime (Kshetri, 2010; Ojedokun and Eraye, 2012; Odekshola and Adeta, 2013). 28 Ilievski and Bernik synthesize the 26 To further illustrate, consider the words of ex- Director of the FBI, James Comey: I have to hire a great workforce to compete with those cyber criminals, and some of those kids want to smoke weed on the way to the interview," he said, adding that the agency was "grappling with the question" of its evolving talent pool (Peterson, 2015). 27 Recalling how loyal pirates at sea could be nudged by monarchs into attacking enemy targets, the Kremlin often subtly invites patriotic hackers to supply surge capacity for cyber operations, including the 2007 DDoS attacks on the Estonian governments and the 2008 dito in Georgia (Galeotti, 2017). 28 Nigerian university students identified the lack of economic opportunity as a man driver of cybercrime (Odekshola and Adeta, 2013). Young Nigerians with computing expertise who engage in cyber fraud are collectively known as Yahoo-yahoo Boys and they typically support themselves on profits from fraud (Ojedokun and Eraye, 2012). The combination of unemployment and expertise among many Russians and East Europeans in the late 1990s led many into cybercrime, using their countries as bases of operations (Kshetri, 2010). results of research on the connection between cybercrime and social-economic factors, finding three empirical studies that establish statistically significant correlations between social-economic characteristics, including unemployment, GDP per capita, and education, and perpetration of cybercrime, such as phishing and fraud (2016). As such, there is reason to believe that the historical case in which states provided fruitful employment for seamen can be instructive in the sense that expanding state cyber forces could reduce cybercrime. If political or practical realities should preclude an expansion in states cyber forces, the Golden Age reliance by governments on privateers to supplement their capabilities can still inform the battle against cybercrime. After crafting detailed contracts - akin to letters of marque - specifying the enemy assets to be targeted, cybersecurity contractors could be permitted to attack or disrupt the (hostile) activities of another state, or actors believed to act as proxies of another state. Importantly, the contracted private companies already hold a majority of the cyber expertise available. As opposed to the current ad hoc publicprivate organizational model, a more institutionalized cyber-privateering model has several substantial implications. First, it helps align various interests against cybercrime. By empowering private organizations to defend themselves against state and non-state cyber attackers to a greater degree, they help the state in protecting intellectual property and data privacy to the benefit of citizens broadly. Second, cyberprivateering projects state power to adversaries, boosting deterrence on account of the private sector s superior cyber capabilities. While Zarate expresses hope that a doctrine of cyber deterrence may emerge in the context of the cyber-privateering model (2015, p. 26), one must also consider the perils. Consider, for instance, a cyber-privateer firm that responds offensively to data breaches, but goes off script and starts attacking lawfully operated ISPs abroad, reminiscent of Captain Kidd s last adventure. Such an instance poses critical political as well as regulatory risks to states, with outcomes that are difficult to survey. Again, since all physical components of the Internet s infrastructure lie within national jurisdictions, an offensive operation by a cyber-privateer can have highly complex consequences as it likely would include servers across the globe (Libicki, 2009; 65

Independent Student Journal 2018: International Relations Mazanec & Thayer, 2015). Lastly, a complicating factor is how cyberdeterrence might be less effective than military deterrence. Whereas pirates (and privateers) faced retribution that often took the form of imprisonment or execution, cybercriminals are physically and legally protected to a greater degree. Arguably, for cyberprivateering to have a deterrent effect, it must be coupled with the legal specialization and strengthened human skills outline above. In sum, the high seas-cyberspace analogy suggests that cybercrime should be treated as a socio-economic problem to a greater extent and indicates that increased hiring into state cyber forces may reduce cybercrime. Meanwhile, a cyber-privateering model promises to unlock cyber capabilities in pursuit of state interests, although its deterrent effect is unclear. CONCLUSION Cyberspace develops exponentially in terms of data and speed, while governments move at a glacial pace, if that, as Singer and Friedman accurately put it (p. 198). Given that the international community still does not fully understand high seas piracy, exemplified by recent experiences in the Gulf of Aden, it has arguably made significant progress regarding cybercrime. The Silk Road cryptomarket and the Rustock botnet, among many similar takedowns, illustrate that legal-technical and public-private cooperation, not to mention grand-scale international cooperation, are possible and do occur. The extent to which the cyber-piracy analogy can contribute strategically to greater numbers of such achievements is not clear-cut, however. The high seas-cyberspace analogy does have some illuminous value to guide the future of cybersecurity. This is particularly true in understanding the salience of incentive structures that connect cybercrime, regulation, and private sector agency. Equally, the comparison is conceptually useful in understanding the limited reach of government power through law enforcement agencies. However, the comparison is not as powerful as Friedman and Singer appear to indicate in their 2014 book, which inspired the present inquiry. The cyber-piracy analogy does little to offer new tools of coercion to be used against states that willfully harbor cybercriminals, such as Russia s patriotic hackers - the equivalent of loyal pirates. Whereas Britain was in a position to impose its will and gradually defeat widespread piracy practices (mainly in the Caribbean), no state has such geopolitical power or legal reach on the Internet. Likewise, the analogy fails to identify new incentive structures that can encourage states to impose their own existing laws to the detriment of domestic cybercriminals. Nevertheless, the high seas-cyberspace analogy highlights a number of strategic areas where current public and private efforts against cybercrmine must be expanded and reinforced. First, the Golden Age of Piracy suggests that the emphasis on enabling structures should be reinforced. The removal of cryptomarkets and bulletproof hosting services can be aided to an extent by the specialization of courts and the training of cyberforensics investigators and prosecutors, although the problem of physical jurisdictions remains. As such, the constraints on governments are often shared with age-old battle against analog crime. Second, the creation of organized cyber-privateering through a modernday letter of marque is a complementary way of acquiring the human expertise needed. It may emulate a deterrent effect upon cybercriminals reminiscent of that of seaborne privateers upon pirates. Third, the analogy points to the need to treat cybercrime as a socio-economic problem. States can reduce the incentives for cybercrime by offering more fruitful employment for cybersavvy individuals. Ultimately, it is noteworthy that the Council of Europe s Convention on Cybercrime, or the Budapest Convention as it is commonly known, arguably constitutes international cooperation in cybercrime prevention at a level to which 18 th century counter-piracy cooperation never came close. Although the Convention is toothless in practice (Chang and Grabosky, 2014), this demonstrates a willingness to seek state-level dialogue. If combined with the revitalization of existing strategies against cybercrime, as suggested by the comparison between piracy and cybercrime, there emerges a promising formula for the battle against cybercrime. BIBLIOGRAPHY Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Specter, M. and Weitzner, D. (2015). Keys under doormats: mandating insecurity by requiring government 66

Noren New Pirates, Old Solutions access to all data and communications. Journal of Cybersecurity, 1(1), pp.69-79. Bassiouni, M. (2001). Universal Jurisdiction for International Crimes: Historical Perspectives and Contemporary Practice. Virginia Journal of International Law, 42(1), pp.81-162. Benton, L. (2009). A Search for Sovereignty. Cambridge: Cambridge University Press. Benton, L. (2011). Toward a New Legal History of Piracy: Maritime Legalities and the Myth of Universal Jurisdiction. International Journal of Maritime History, XXIII(1), pp.225-240. Bilton, N. (2017). American Kingpin: The Epic Hunt for the Criminal MasterMind Behind the Silk Road. London: Portfolio. Bright, P. (2011). How Operation b107 decapitated the Rustock botnet. [online] Ars Technica. Available at: https://arstechnica.com/information- technology/2011/03/how-operation-b107- decapitated-the-rustock-botnet/ [Accessed 4 Apr. 2018]. Boot, M. (2009). Pirates, Then And Now: How Piracy Was Defeated In The Past And Can Be Again. Foreign Affairs, 88(4), pp.97-104. Botting, D. (1978). The Pirates. Amsterdam: Time-Life Books. Broséus, J., Rhumorbarbe, D., Mireault, C., Ouellette, V., Crispino, F. and Décary-Hétu, D. (2016). Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective. Forensic Science International, 264, pp.7-14. CCHS (2016). Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats. Washington, D.C.: Center for Cyber & Homeland Security. Chang, L. and Grabosky, P. (2014). Cybercrime and Establishing a Secure Cyberworld. In: M. Gill, ed., The Handbook of Security, 2nd ed. Basingstoke: Palgrave Macmillan. Cordingly, D. (1995). Under the Black Flag: The Romance and the Reality of Life Among the Pirates. New York City, NY: Random House. Deibert, R., Rohozinski, R. and Crete-Nishihata, M. (2012). Cyclones in cyberspace: Information shaping and denial in the 2008 Russia Georgia war. Security Dialogue, 43(1), pp.3-24. Egloff, F. (2017). Cybersecurity and the Age of Privateering. In: G. Perkovich and A. Levite, ed., Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press: Washington, D.C., pp.231-247. Fiske, J. (1897). Old Virginia and her neighbours. 7th ed. Boston: Houghton, Mifflin and Company. Galeotti, M. (2011). Why are Russians excellent cybercriminals?. The Moscow News. Retrieved from https://web.archive.org/web/20150513031041/ http://themoscownews.com/siloviks_scoundre ls/20111121/ Galeotti, M. (2017). Crimintern: How the Kremlin Uses Russia's Criminal Networks in Europe. London: European Council on Foreign Relations. Garrett, B. (2013). Taming the Wild Wild Web: Twenty-First Century Prize Law and Privateers as a Solution to Combating Cyber- Attacks. University of Cincinnati Law Review, [online] 81(2), pp.683-707. Garrod, M. (2014). Piracy, the Protection of Vital State Interests and the False Foundations of Universal Jurisdiction in International Law. Diplomacy & Statecraft, 25(2), pp.195-213. Goncharov, M. (2015). Criminal Hideouts for Lease: Bulletproof Hosting Services. TrendLabs Research Papers. Tokyo: Trend Micro. Habibu, S. (2016). Special court for cyber crimes. [online] Thestar.com.my. Available at: https://www.thestar.com.my/news/nation/201 6/09/02/special-court-for-cyber-crimestechsavvy-judges-being-trained-to-handleoffences-from-spying-to-bank/ [Accessed 4 Apr. 2018]. Hayes, B., Jeandesboz, J., Ragazzi, F., Simon, S. and Mitsilegas, V. (2015). The law enforcement challenges of cybercrime. Luxembourg: European Parliament Publications Office. Hoffman, W. and Levite, A. (2017). Private Sector Cyber Defense: Can Active Measures Help Stabilize Cyberspace?. [online] Washington, D.C.: Carnegie Endowment for International Peace. Available at: http://carnegieendowment.org/files/cyber_de fense_int_final_full.pdf [Accessed 4 Mar. 2018]. Hoque, N., Kashyap, H. and Bhattacharyya, D. (2017). Real-time DDoS attack detection using FPGA. Computer Communications, 110, pp.48-58. Ilievski, A., and Bernik, I. (2016). Socio- Economic Aspects of Cybercrime. Innovative 67

Independent Student Journal 2018: International Relations Issues and Approaches in Social Sciences, 9(3), 8-22. Jarvis, R. (2006). Maritime Piracy in the Modern World. Insights on Law & Society, 6(3). Kempe, M. (2010). Even in the remotest corners of the world : globalized piracy and international law, 1500 1900. Journal of Global History, 5(03), pp.353-372. Konstam, A. and Cordingly, D. (2005). The History of Pirates. London: Mercury Books. Kontorovich, E. (2004). The Piracy Analogy: Modern Universal Jurisdiction's Hollow Foundation. Harvard International Law Journal, 45(1). Kshetri, N. (2010). Diffusion and Effects of Cyber-Crime on Developing Economies. Third World Quarterly, 31(7), 1057-1079. Libicki, M. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation. Lunsford, V. (2005). Piracy and privateering in the golden age Netherlands. New York: Palgrave Macmillan. Lynch, V. (2017). Banrisul: SSL Certificates Used In Major Bank Hack. [online] Hashed Out. Available at: https://www.thesslstore.com/blog/sslcertificates-used-in-major-bank-hack/ [Accessed 4 Mar. 2018]. Mahjoub, D. (2017). Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers. Mahjoub, D. and Passwaters, J. (2017). BPH exposed RBN never left, they just adapted and evolved. Did you?. Makovsky, D. (2017). The Silent Strike. [online] The New Yorker. Available at: https://www.newyorker.com/magazine/2012/0 9/17/the-silent-strike [Accessed 1 Feb. 2018]. Martin, J. (2013). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology & Criminal Justice, 14(3), pp.351-367. Mazanec, B. and Thayer, B. (2015). Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Basingstoke: Palgrave Macmillan. McGuire, M. and Dowling, S. (2013). Cyber crime: A review of the evidence. London: United Kingdom Home Office. Neither War nor Peace: The Uses of Constructive Ambiguity. (2018). The Economist. [online] Available at: https://www.economist.com/news/specialreport/21735474-uses-constructive-ambiguity- neither-war-nor-peace [Accessed 4 Mar. 2018]. Ojedokun, U., and Eraye, M. (2012). Socioeconomic Lifestyles of the Yahoo-Boys: A Study of Perceptions of University Students in Nigeria. International Journal of Cyber Criminology, 6(2), 1001-1013. Okeshola, F., and Adeta, A. (2013). The Nature, Causes, and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research. 3(9), 98-114. On the cyber-frontier. (2018). The Economist. [online] Available at: https://www.economist.com/news/obituary/21 737237-songwriter-and-internet-utopian-was- 70-obituary-john-perry-barlow-died-february- 7th [Accessed 4 Apr. 2018]. Perry Barlow, J. (1996). A Declaration of the Independence of Cyberspace. [online] Electronic Frontier Foundation. Available at: https://www.eff.org/cyberspace-independence [Accessed 4 Apr. 2018]. Peterson, A. (2015). How the government tries to recruit hackers on their own turf. [online] washingtonpost.com. Available at: https://www.washingtonpost.com/news/theswitch/wp/2015/10/24/how-the-governmenttries-to-recruit-hackers-on-their-ownturf/?utm_term=.e2a98252ee9f [Accessed 6 Apr. 2018]. Pisaric, M. (2017). Specialization of Criminal Justice Authorities in Dealing with Cybercrime. Journal of Criminal Justice and Security, 17(2), pp.230-242. Rabkin, J. and Rabkin, A. (2013). Navigating Conflicts in Cyberspace: Legal Lessons from the History of War at Sea. Chicago Journal of International Law, 14(1), pp.197-258. Rediker, M. (1981). "Under the Banner of King Death": The Social World of Anglo-American Pirates, 1716 to 1726. The William and Mary Quarterly, 38(2), p.203. Rediker, M. (2004). Villains of All Nations: Atlantic Pirates in the Golden Age. London: Verso. Richard, T. (2010). Reconsidering the Letter of Marque: Utilizing Private Security Providers Against Piracy. Public Contract Law Journal, 39(3), pp.411-464. Ritchie, R. (1986). Captain Kidd and the War against the Pirates. Cambridge, MA.: Harvard University Press. Rosenzweig, P. (2014). International Law and Private Actor Active Cyber Defensive 68

Noren New Pirates, Old Solutions Measures. Stanford Journal of International Law, 50(1). Stephenson, M. (2014). Corruption and the Revolving Door: Recent Discussions and Further Reflections. [Blog] The Global Anticorruption Blog. Available at: https://globalanticorruptionblog.com/2014/10/ 28/corruption-and-the-revolving-door-recentdiscussions-and-further-reflections/ [Accessed 5 Mar. 2018]. Spearin, C. (2014). Promising Privateers? Understanding The Constraints Of Contemporary Private Security At Sea. Naval War College Review, 67(2), pp.97-116. Singer, P. and Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press. Thomson, J. (1994). Mercenaries, Pirates, and Sovereigns. Princeton: Princeton University Press. What is A Botnet?. Norton.com. Retrieved 5 April 2018 from https://us.norton.co/internetsecurity-malwarewhat-is-a-botnet.html Woodard, C. (2007). The Republic of Pirates: Being the True and Surprising Story of the Caribbean Pirates and the Man Who Brought Them Down. Harcourt Trade. Zarate, J. (2015). The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response. Washington, D.C.: Foundation for Defense of Democracies 69