text
stringlengths
4
429
The data trail often goes cold when it crosses borders because there is little
legal framework for such investigations. And many countries, along with the
United Nations and other international bodies, are still weighing whether a
cyber attack is an act of war.
"If a state brings down the Internet intentionally, another state could very well
consider that a hostile act," said Jonathan Zittrain, co-founder of Harvard's
Berkman Center for Internet Society, and a principal investigator for the
OpenNet Initiative.
There are also strategic reasons not to disrupt networks in order to monitor the
enemy's conversations or to spread misinformation.
"That's an amazing intelligence opportunity," he said.
Using the Internet to control information can be more important than
disrupting the networks when it comes to military strategy, Rohozinski said. In
Georgia, for example, the lack of access to both Georgian and Russian
sources of information kept citizens in the dark while the fighting continued.
"Sometimes the objective is not to knock out the infrastructure but to
undermine the will of the people you're fighting against," he said. "It's about
the nuts and bolts, but it's also about how perceptions can be shaped
through what's available and what's not."
NEWSWEEK
1 September 2008
By Trevis Wentworth
ve Got Malice
Russian nationalists waged a cyber war against Georgia. Fighting back is
virtually impossible.
On July 20, weeks before Russia stunned Georgia with a rapid invasion, the
cyber attack was already under way. While Moscow baited Georgia with
troop movements on the borders of the breakaway provinces of Abkhazia
and South Ossetia, the "zombie" computers were already on the attack.
Russian viruses had seized hundreds of thousands of computers around the
world, directing them to barrage Georgian Web sites, including the pages of
the president, the parliament, the foreign ministry, news agencies and banks,
which shut down their servers at the first sign of attack to pre-empt identity
theft. At one point the parliament's Web site was replaced by images
comparing Georgian president Mikheil Saakashvili to Adolf Hitler. This was not
the first Russian cyber assault
that came against Estonia, in April of 2007
it was the first time an Internet attack paralleled one on land.
The labyrinthine ways of the Web and the complicated interfaces between
the Russian government's clandestine services and organized crime make it
impossible, at this point, to say with certainty who was responsible, or how far
up the chain of command it went. The Russian military certainly had the
means to attack Georgia's Internet infrastructure, says Jonathan Zittrain,
cofounder of Harvard's Berkman Center for Internet and Society. Moreover,
the attacks were too successful to have materialized independent of one
another. Bill Woodcock, the research director at Packet Clearing House, a
California-based nonprofit group that tracks Internet security trends, says the
attacks bear the markings of a "trained and centrally coordinated cadre of
professionals."
But who? Jart Armin, who has tracked Russian cybercrime, points to the
possibility that a role was played by the notorious Russian Business Network, a
cybermafia that specializes in identity theft, child pornography, extortion and
other dark and lucrative Internet crimes. The RBN's political agenda is vague
or nonexistent, but it often contracts out its services, and Armin says there is
increasing evidence that it is connected to, or at least tolerated by, the
Kremlin.
Indeed the timing is such that it's hard to discount some sort of Kremlin
coordination, even if it's impossible to prove, and Woodcock argues that such
cyber assaults have become a tool of Russian political leadership. As the
attacks' political intentions became more specific, he notes, the operations
have grown more complex. In addition to targeting Georgian government
and media Web sites, Russian hackers brought down the Russian newspaper
Skandaly.ru, apparently for expressing some pro-Georgian sentiment. "This
was the first time that they ever attacked an internal and an external target
as part of the same attack," he says.
Fighting back is tough. When Russian hackers made a name for themselves
last year by bringing down the Web site of the Estonian parliament along with
the sites of banks, ministries and newspapers, Estonian Foreign Minister Urmas
Paet immediately accused the Kremlin of backing the attacks. But he was
unable to produce evidence supporting his claims. Putin eventually named a
suspect, or scapegoat, within his government. As Russian hackers waged a
similar assault on Georgian sites over the past few weeks, Estonia
one of
Europe's most wired countries
offered its better-defended servers to host
many Georgian government Web sites. Lithuania and Poland have stepped
up as well, prompting some excited bloggers to suggest that this is a digital
Sarajevo, akin to the events of August 1914, the start of the first Internet world
war. Certainly that's exaggerated, but the mutual defense going on in
cyberspace shows that these nations take the Russian threat to their online
infrastructure seriously.
Still, the nature of the Internet is such that it is almost impossible to respond
quickly enough. The government doesn't maintain its own botnets
large
networks of zombified computers standing ready to attack
but can rent one
from a crime network, like the Russian Business Network. Then, through statecontrolled media, the government can inspire waves of nationalists to amplify
the destructive force. "Everybody with a laptop has the responsibility to attack
the enemy
and you find out who the enemy is by looking at what the
government is saying," Woodcock says.
While no one can say who wrote the malware that was used to cause
Georgian servers to crash, it certainly proliferated on Russian Web sites in a
user-friendly form. Gary Warner, a cybercrime expert at the University of
Alabama at Birmingham, says he found "copies of the attack script" posted in
the reader comments section at the bottom of virtually every story in the
Russian media that covered the Georgian conflict, complete with instructions
on how the script could be used to attack a specific list of Web sites. The
efficiency is enough to make Russia's tanks and planes and ships, however
deadly, appear downright anachronistic.