text
stringlengths 4
429
|
---|
or killed and it is much harder to pinpoint the source and who is involved," he
|
told Sky News.
|
The hackers have also been targeting the website of Garry Kasparov, the
|
Russian opposition figure and former chess champion.
|
WASHINGTON POST
|
27 August 2008
|
By Kim Hart
|
A New Breed Of Hackers Tracks Online Acts of War
|
'Hacktivists' Update Their Mission
|
TORONTO -- Here in the Citizen Lab at the University of Toronto, a new breed
|
of hackers is conducting digital espionage.
|
They are among a growing number of investigators who monitor how traffic is
|
routed through countries, where Web sites are blocked and why it's all
|
happening. Now they are turning their scrutiny to a new weapon of
|
international warfare: cyber attacks.
|
Tracking wars isn't what many of the researchers, who call themselves
|
"hacktivists," set out to do. Many began intending to help residents in
|
countries that censor online content. But as the Internet has evolved, so has
|
their mission.
|
Ronald J. Deibert, director of the Citizen Lab, calls the organization a "global
|
civil society counterintelligence agency" and refers to the lab as the "NSA of
|
operations."
|
Their efforts have ramped up in the past year as researchers gather evidence
|
that Internet assaults are playing a larger role in military strategy and political
|
struggles. Even before Georgia and Russia entered a ground war earlier this
|
month, Citizen Lab's researchers noticed sporadic attacks aimed at several
|
Georgian Web sites. Such attacks are especially threatening to countries that
|
increasingly link critical activities such as banking and transportation to the
|
Internet.
|
Once the fighting began, massive raids on Georgia's Internet infrastructure
|
were deployed using techniques similar to those used by Russian criminal
|
organizations. Then, attacks seemed to come from individuals who found
|
online instructions for launching their own assaults, shutting down much of
|
Georgia's communication system.
|
Two weeks later, researchers are still trying to trace the origins of the attacks.
|
"These attacks in effect had the same effect that a military attack would
|
have," said Rafal Rohozinski, who co-founded the Information Warfare
|
Monitor, which tracks cyber attacks, with Citizen Lab in 2003. "That suddenly
|
means that in cyberspace anyone can build an A-bomb."
|
The cyber attacks that disabled many Georgian and Russian Web sites earlier
|
this month marked the first time such an assault coincided with physical
|
fighting. And the digital battlefield will likely become a permanent front in
|
modern warfare, Deibert said.
|
Seven years ago, Deibert opened the Citizen Lab using grant money from the
|
Ford Foundation. Soon after, he and Rohozinski helped begin the OpenNet
|
Initiative, a collaboration with Harvard's Law School, Cambridge and Oxford
|
universities that tracks patterns of Internet censorship in countries that use
|
filters, such as China. The project received an additional $3 million from the
|
MacArthur Foundation. Deibert and Rohozinski also launched the Information
|
Warfare Monitor to investigate how the Internet is used by state military and
|
political operations. And Citizen Lab researchers have created a software
|
tool called Psiphon that helps users bypass Internet filters.
|
The combined projects have about 100 researchers in more than 70 countries
|
mapping Web traffic and testing access to thousands of sites.
|
A number of companies specialize in cyber security, and several nonprofit
|
organizations have formed cyber-surveillance projects to keep international
|
vigil over the Web. Shadowserver.org, for example, is a group of 10 volunteer
|
researchers who post their findings about cyber attacks online.
|
The small Toronto office of Citizen Lab, tucked in a basement of the
|
university's Munk Centre for International Studies, serves as the technological
|
backbone for the operations. World maps and newspaper clips cover the
|
walls. Researchers move between multiple computer screens, studying lists of
|
codes with results from field tests in Uzbekistan, Cambodia, Iran and
|
Venezuela, to name a few.
|
"We rely on local experts to help us find out why a particular site is being
|
blocked," Deibert said. It could be a problem with the Internet service
|
provider, a temporary connection glitch or a downed server. "But what's more
|
effective is blasting a site into oblivion when it is strategically important. It's
|
becoming a real arms race."
|
He's referring to "denial of service" attacks, in which hundreds of computers in
|
a network, or "botnets," simultaneously bombard a Web site with millions of
|
requests, overwhelming and crashing the server. In Georgia, such attacks
|
were strong enough to knock key sources of news and information offline for
|
days.
|
Georgian Internet service providers also limited access to Russian news media
|
outlets, cutting off the only remaining updates about the war. On the night of
|
Aug. 12 -- the height of the fighting -- "there was panic in Tbilisi brought about
|
by a vacuum of information," Rohozinski said.
|
Shadowserver saw the first denial of service attack against Georgia's
|
presidential Web site July 20. When the fighting began, Andre M. Di Mino,
|
Shadowserver's founder, counted at least six botnets launching attacks, but it
|
was "difficult to tell if it was a grass-roots effort or one commissioned by the
|
government."
|
The organization detects between 30 and 50 denial of service attacks every
|
day around the world, and Di Mino said they have become more
|
sophisticated over the past two years.
|
"It really went from almost a kiddie type of thing to where it's an organized
|
enterprise," he said. But he's hesitant to label this month's attacks as a form of
|
cyberwar, although he expects networks to play an expanded role in political
|
clashes.
|
Jose Nazario, a security researcher with Arbor Networks, said cyber attacks
|
used to target a computer's operating system. But he's seen a "tremendous
|
rise" in attacks on Web browsers, allowing attackers access to much more
|
personal information, such as which sites a person visits frequently. An
|
attacker then could learn which servers to target in order to disrupt
|
communication.
|
It's unclear who is behind the attacks, however. In some cases, the locations
|
of botnet controllers can be traced, but it's impossible to know whether an
|
attacker is working on the behalf of another organization or government. "It's
|
going to take a year to figure this out," Nazario said.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.