The US's Defense Advanced Research Projects Agency (DARPA) wants to develop technologies to extract behavioural and physical biometrics from a range of devices and vantage points to consistently identify virtual personas and individual malicious cyberoperators.The key task is “cyber attribution” as part of DARPA's Enhanced Attribution (EA) program.The goal of the EA program is to develop technologies for generating operationally and tactically relevant information about multiple concurrent independent malicious cyber campaigns, each involving several operators; and the means to share such information with any of a number of interested parties without putting at risk the sources and methods used for collection.https://www.fbo.gov/index?s=opportunity&mode=form&id=93c091efb6a2252556aa8530cdce71ed&tab=core&_cview=0In a background on the initiative, DARPA states: “Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals. The reason cyber attribution is difficult stems at least in part from a lack of end-to-end accountability in the current Internet infrastructure”.The body wants to target “Vantage points of interest” saying these include, but are not limited to: Internet-of-Things (IoT) devices Mobile phones Development (Dev) and Operations (Ops) desktops and laptops of malicious cyberoperators Network infrastructureThe US's Defense Advanced Research Projects Agency (DARPA) wants to develop technologies to extract behavioural and physical biometrics from a range of devices and vantage points to consistently identify virtual personas and individual malicious cyberoperators.The key task is “cyber attribution” as part of DARPA's Enhanced Attribution (EA) program.The goal of the EA program is to develop technologies for generating operationally and tactically relevant information about multiple concurrent independent malicious cyber campaigns, each involving several operators; and the means to share such information with any of a number of interested parties without putting at risk the sources and methods used for collection.In a background on the initiative, DARPA states: “Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals. The reason cyber attribution is difficult stems at least in part from a lack of end-to-end accountability in the current Internet infrastructure”.The body wants to target “Vantage points of interest” saying these include, but are not limited to:Internet-of-Things (IoT) devicesMobile phonesDevelopment (Dev) and Operations (Ops) desktops and laptops of malicious cyberoperatorsNetwork infrastructureDARPA is seeking operators who will explore techniques for tracking malicious cyber operators from various vantage points, toward characterizing the individual behavior and cyber-relevant actions taken by said operators,