In a way, cybercriminals are the same – they employ techniques that are similar and, like conventional criminals, they target the most vulnerable the first and most.
They hide behind software that obscures their identity and leads investigators to look far from their actual hideouts. They kidnap data and hold it hostage. They target companies and people whose information is the worst protected.
Unlike nuclear energy, a neat division between civilian and military use of cyberspace is difficult. Just as the Indian Army may face serious cyber attacks from non-state actors in Pakistan, the digital assets of a major Indian conglomerate — ....