In 2007, Amyn Gilani was deployed to Iraq as a U.S. Air Force intelligence analyst, assigned to the Joint Special Operations Command (JSOC) Task Force with one clear objective: disrupt terrorist activities by targeting and capturing al-Qaeda insurgents.
His success in slowing down the enemy was a direct result of obtaining accurate intelligence and positive identification (PID) of the adversaries, despite their best efforts to remain unseen—and today’s cyber attackers are no different.
By uncovering the identity of cybercriminals attacking an organization, you can disrupt the adversary and prevent future attacks, which can be achieved through 4iQ VP of Product Amyn Gilani’s five-step approach, outlined in his latest op-ed for Help Net Security.
Not only is attribution for disruption applicable to military Task Forces, it can be effectively beneficial to financial services, retailers, cryptocurrency markets, social media platforms, as well as intelligence and law enforcement units. For law enforcement, attribution is crucial for prosecution and building a case. For corporations, attribution means identifying bad actors in order to assess the risk that an individual or entity poses, allowing the corporation to construct a competitive counter strategy.