text
stringlengths
4
429
or killed and it is much harder to pinpoint the source and who is involved," he
told Sky News.
The hackers have also been targeting the website of Garry Kasparov, the
Russian opposition figure and former chess champion.
WASHINGTON POST
27 August 2008
By Kim Hart
A New Breed Of Hackers Tracks Online Acts of War
'Hacktivists' Update Their Mission
TORONTO -- Here in the Citizen Lab at the University of Toronto, a new breed
of hackers is conducting digital espionage.
They are among a growing number of investigators who monitor how traffic is
routed through countries, where Web sites are blocked and why it's all
happening. Now they are turning their scrutiny to a new weapon of
international warfare: cyber attacks.
Tracking wars isn't what many of the researchers, who call themselves
"hacktivists," set out to do. Many began intending to help residents in
countries that censor online content. But as the Internet has evolved, so has
their mission.
Ronald J. Deibert, director of the Citizen Lab, calls the organization a "global
civil society counterintelligence agency" and refers to the lab as the "NSA of
operations."
Their efforts have ramped up in the past year as researchers gather evidence
that Internet assaults are playing a larger role in military strategy and political
struggles. Even before Georgia and Russia entered a ground war earlier this
month, Citizen Lab's researchers noticed sporadic attacks aimed at several
Georgian Web sites. Such attacks are especially threatening to countries that
increasingly link critical activities such as banking and transportation to the
Internet.
Once the fighting began, massive raids on Georgia's Internet infrastructure
were deployed using techniques similar to those used by Russian criminal
organizations. Then, attacks seemed to come from individuals who found
online instructions for launching their own assaults, shutting down much of
Georgia's communication system.
Two weeks later, researchers are still trying to trace the origins of the attacks.
"These attacks in effect had the same effect that a military attack would
have," said Rafal Rohozinski, who co-founded the Information Warfare
Monitor, which tracks cyber attacks, with Citizen Lab in 2003. "That suddenly
means that in cyberspace anyone can build an A-bomb."
The cyber attacks that disabled many Georgian and Russian Web sites earlier
this month marked the first time such an assault coincided with physical
fighting. And the digital battlefield will likely become a permanent front in
modern warfare, Deibert said.
Seven years ago, Deibert opened the Citizen Lab using grant money from the
Ford Foundation. Soon after, he and Rohozinski helped begin the OpenNet
Initiative, a collaboration with Harvard's Law School, Cambridge and Oxford
universities that tracks patterns of Internet censorship in countries that use
filters, such as China. The project received an additional $3 million from the
MacArthur Foundation. Deibert and Rohozinski also launched the Information
Warfare Monitor to investigate how the Internet is used by state military and
political operations. And Citizen Lab researchers have created a software
tool called Psiphon that helps users bypass Internet filters.
The combined projects have about 100 researchers in more than 70 countries
mapping Web traffic and testing access to thousands of sites.
A number of companies specialize in cyber security, and several nonprofit
organizations have formed cyber-surveillance projects to keep international
vigil over the Web. Shadowserver.org, for example, is a group of 10 volunteer
researchers who post their findings about cyber attacks online.
The small Toronto office of Citizen Lab, tucked in a basement of the
university's Munk Centre for International Studies, serves as the technological
backbone for the operations. World maps and newspaper clips cover the
walls. Researchers move between multiple computer screens, studying lists of
codes with results from field tests in Uzbekistan, Cambodia, Iran and
Venezuela, to name a few.
"We rely on local experts to help us find out why a particular site is being
blocked," Deibert said. It could be a problem with the Internet service
provider, a temporary connection glitch or a downed server. "But what's more
effective is blasting a site into oblivion when it is strategically important. It's
becoming a real arms race."
He's referring to "denial of service" attacks, in which hundreds of computers in
a network, or "botnets," simultaneously bombard a Web site with millions of
requests, overwhelming and crashing the server. In Georgia, such attacks
were strong enough to knock key sources of news and information offline for
days.
Georgian Internet service providers also limited access to Russian news media
outlets, cutting off the only remaining updates about the war. On the night of
Aug. 12 -- the height of the fighting -- "there was panic in Tbilisi brought about
by a vacuum of information," Rohozinski said.
Shadowserver saw the first denial of service attack against Georgia's
presidential Web site July 20. When the fighting began, Andre M. Di Mino,
Shadowserver's founder, counted at least six botnets launching attacks, but it
was "difficult to tell if it was a grass-roots effort or one commissioned by the
government."
The organization detects between 30 and 50 denial of service attacks every
day around the world, and Di Mino said they have become more
sophisticated over the past two years.
"It really went from almost a kiddie type of thing to where it's an organized
enterprise," he said. But he's hesitant to label this month's attacks as a form of
cyberwar, although he expects networks to play an expanded role in political
clashes.
Jose Nazario, a security researcher with Arbor Networks, said cyber attacks
used to target a computer's operating system. But he's seen a "tremendous
rise" in attacks on Web browsers, allowing attackers access to much more
personal information, such as which sites a person visits frequently. An
attacker then could learn which servers to target in order to disrupt
communication.
It's unclear who is behind the attacks, however. In some cases, the locations
of botnet controllers can be traced, but it's impossible to know whether an
attacker is working on the behalf of another organization or government. "It's
going to take a year to figure this out," Nazario said.