text
stringlengths 4
429
|
---|
The data trail often goes cold when it crosses borders because there is little
|
legal framework for such investigations. And many countries, along with the
|
United Nations and other international bodies, are still weighing whether a
|
cyber attack is an act of war.
|
"If a state brings down the Internet intentionally, another state could very well
|
consider that a hostile act," said Jonathan Zittrain, co-founder of Harvard's
|
Berkman Center for Internet Society, and a principal investigator for the
|
OpenNet Initiative.
|
There are also strategic reasons not to disrupt networks in order to monitor the
|
enemy's conversations or to spread misinformation.
|
"That's an amazing intelligence opportunity," he said.
|
Using the Internet to control information can be more important than
|
disrupting the networks when it comes to military strategy, Rohozinski said. In
|
Georgia, for example, the lack of access to both Georgian and Russian
|
sources of information kept citizens in the dark while the fighting continued.
|
"Sometimes the objective is not to knock out the infrastructure but to
|
undermine the will of the people you're fighting against," he said. "It's about
|
the nuts and bolts, but it's also about how perceptions can be shaped
|
through what's available and what's not."
|
NEWSWEEK
|
1 September 2008
|
By Trevis Wentworth
|
ve Got Malice
|
Russian nationalists waged a cyber war against Georgia. Fighting back is
|
virtually impossible.
|
On July 20, weeks before Russia stunned Georgia with a rapid invasion, the
|
cyber attack was already under way. While Moscow baited Georgia with
|
troop movements on the borders of the breakaway provinces of Abkhazia
|
and South Ossetia, the "zombie" computers were already on the attack.
|
Russian viruses had seized hundreds of thousands of computers around the
|
world, directing them to barrage Georgian Web sites, including the pages of
|
the president, the parliament, the foreign ministry, news agencies and banks,
|
which shut down their servers at the first sign of attack to pre-empt identity
|
theft. At one point the parliament's Web site was replaced by images
|
comparing Georgian president Mikheil Saakashvili to Adolf Hitler. This was not
|
the first Russian cyber assault
|
that came against Estonia, in April of 2007
|
it was the first time an Internet attack paralleled one on land.
|
The labyrinthine ways of the Web and the complicated interfaces between
|
the Russian government's clandestine services and organized crime make it
|
impossible, at this point, to say with certainty who was responsible, or how far
|
up the chain of command it went. The Russian military certainly had the
|
means to attack Georgia's Internet infrastructure, says Jonathan Zittrain,
|
cofounder of Harvard's Berkman Center for Internet and Society. Moreover,
|
the attacks were too successful to have materialized independent of one
|
another. Bill Woodcock, the research director at Packet Clearing House, a
|
California-based nonprofit group that tracks Internet security trends, says the
|
attacks bear the markings of a "trained and centrally coordinated cadre of
|
professionals."
|
But who? Jart Armin, who has tracked Russian cybercrime, points to the
|
possibility that a role was played by the notorious Russian Business Network, a
|
cybermafia that specializes in identity theft, child pornography, extortion and
|
other dark and lucrative Internet crimes. The RBN's political agenda is vague
|
or nonexistent, but it often contracts out its services, and Armin says there is
|
increasing evidence that it is connected to, or at least tolerated by, the
|
Kremlin.
|
Indeed the timing is such that it's hard to discount some sort of Kremlin
|
coordination, even if it's impossible to prove, and Woodcock argues that such
|
cyber assaults have become a tool of Russian political leadership. As the
|
attacks' political intentions became more specific, he notes, the operations
|
have grown more complex. In addition to targeting Georgian government
|
and media Web sites, Russian hackers brought down the Russian newspaper
|
Skandaly.ru, apparently for expressing some pro-Georgian sentiment. "This
|
was the first time that they ever attacked an internal and an external target
|
as part of the same attack," he says.
|
Fighting back is tough. When Russian hackers made a name for themselves
|
last year by bringing down the Web site of the Estonian parliament along with
|
the sites of banks, ministries and newspapers, Estonian Foreign Minister Urmas
|
Paet immediately accused the Kremlin of backing the attacks. But he was
|
unable to produce evidence supporting his claims. Putin eventually named a
|
suspect, or scapegoat, within his government. As Russian hackers waged a
|
similar assault on Georgian sites over the past few weeks, Estonia
|
one of
|
Europe's most wired countries
|
offered its better-defended servers to host
|
many Georgian government Web sites. Lithuania and Poland have stepped
|
up as well, prompting some excited bloggers to suggest that this is a digital
|
Sarajevo, akin to the events of August 1914, the start of the first Internet world
|
war. Certainly that's exaggerated, but the mutual defense going on in
|
cyberspace shows that these nations take the Russian threat to their online
|
infrastructure seriously.
|
Still, the nature of the Internet is such that it is almost impossible to respond
|
quickly enough. The government doesn't maintain its own botnets
|
large
|
networks of zombified computers standing ready to attack
|
but can rent one
|
from a crime network, like the Russian Business Network. Then, through statecontrolled media, the government can inspire waves of nationalists to amplify
|
the destructive force. "Everybody with a laptop has the responsibility to attack
|
the enemy
|
and you find out who the enemy is by looking at what the
|
government is saying," Woodcock says.
|
While no one can say who wrote the malware that was used to cause
|
Georgian servers to crash, it certainly proliferated on Russian Web sites in a
|
user-friendly form. Gary Warner, a cybercrime expert at the University of
|
Alabama at Birmingham, says he found "copies of the attack script" posted in
|
the reader comments section at the bottom of virtually every story in the
|
Russian media that covered the Georgian conflict, complete with instructions
|
on how the script could be used to attack a specific list of Web sites. The
|
efficiency is enough to make Russia's tanks and planes and ships, however
|
deadly, appear downright anachronistic.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.