Whos international mep ship is working to improve the security condition worldwide. We start by reviewing some successful bott net take downs in recent years. They may prove instructive as they are successes. In 2008, the conflict worm was discovered. I had competing commercials security companies. Members cooperated with each other to mitigate this global threat. Then in 2011, the u. S. Department of justice led operation ghost click, in which a criminal gang in estonia was arrested, charged with wire fraud and conspiracy. While shutting off the criminal infrastructure the victims depended on. My employer was the courtappointed receiver for the criminals Internet Connectivity and resources. I personally prepared, installed and operated the replacement servers necessary for that takedown. In each of these examples, we seed an ad hoc Public Private partnership in which trust was established and sensety information, including Strategic Planning was shared without any contractual framewor
Second, this is how criminals work with other criminals. We would not get far by trying to solve these fast evolving global problems with topdown control or through government directives and rules. As you yourself pointed out, a botnet is literally a network of robots, whereby robot we mean a computer thats been captured and made to run software neither provided by the maker or authorized or installed by its owner. It has conflict and so forth. The only hard and fast requirement for any of this software is interoperability, meaning it merely has to work. The cost of the internets spectacular growth d. Sorry the cost is much of the software we run was not adequately tested. The challenge for the internet is perhaps theres more assurance that an ul listed toaster will not burn our house, whereas some of our devices are insulated from becoming a tool of online criminals. These are Consumer Devices in a competitive and fastmoving market. Time to market is often the distance between success