text
stringlengths 4
429
|
---|
Russian government was not directly involved. It appeared to have been |
hacktavists |
simply a mass number of individuals upset over the relocation of the statue. Plans for the |
attacks were posted on internet forums, message boards, and chat groups prior to the attacks, |
including detailed instructions on how to send disruptive messages and which Estonian |
websites to use as targets. The discussion of proposed attacks had become so popular that it |
was indexed by Google, causing a Google search for the topic to return these incendiary |
websites at the top of its search results, bringing them to the attention of even more people. |
Despite being aware of these discussions prior to the attacks, Estonia could do little to stop |
them. Estonian officials could not identify the individuals discussing attacks, as online (not |
real) names were used, and obtaining IP addresses would involve going after the website |
administrator and foreign ISP |
a task with which mega-corporations such as the MPAA and |
RIAA have difficulty, despite their massive funding and even when going after domestic IP |
addresses. Further, there is no certainty that an individual participating in the discussion will |
act on his or her comments, there were mass numbers of people involved (each with a |
different IP address, ISP, and host state to deal with), and there is no solid legal apparatus in |
place to deal with such an undertaking. Nonetheless, there was a growing and visible threat. |
Estonian officials may have been better off devoting their resources to plant online |
operatives. These operatives could have placed well thought out comments to try and sway |
the crowd. Rather than spending all resources on physical prevention, some resources could |
be used to train operatives in PSYOPS, mob mentality, propaganda, and logical deterrents |
such as subtly mentioning flaws in their arguments, or the consequences of participating in |
such an attack. In order to be effective this would also require an in-depth understanding of |
internet subcultures (List of Internet Phenomena 2008; Pang 2008; Slashdot Subculture 2008; |
Slashdot Trolling Phenomenon 2008). Subtle techniques, such as self-deprecating humour, |
can sway the crowd |
s emotions and train of thought (Landler and Markoff 2007). Russian |
government involvement may have been as an instigator, knowingly or not, as |
there [were] |
anti-Estonian sentiments, fuelled by Russian state propaganda, and the sentiments were |
voiced in articles, blogs, forums and the press |
(The Cyber Raiders Hitting Estonia 2007). |
This could be a type of outsourcing of activity that provides a low cost attack with high |
deniability. Once in the hands of an unwitting mob, the tools necessary are readily available |
and the means are simple, thereby coordinating a massive data request simultaneously. On an |
individual level it takes very little effort, yet as a combined whole it has devastating effect |
with emergent sophistication. This small individual role, may also cause participants to feel |
less responsible (Estonia Fines Man for 'Cyber War' 2008). |
Legality |
In addition to the difficulty of identifying the source of a cyber attack, a lack of legal |
framework to deal with such an attack makes it exceedingly problematic. Only one person |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
has been charged and convicted in connection with the Estonian attacks. Dmitri |
Galushkevich was fined 17,500 kroons for attacking the Reform Party website. Galushkevich |
admitted to his assault on the site, and he is believed to have acted alone. Several leads in |
identifying other potential participants in the Estonian attacks relied on Russian cooperation. |
Estonia made a formal investigation assistance request under a Mutual Legal Assistance |
Treaty (MLAT) between the states. Moscow appeared as though it would help, but after a |
delay in action, it ultimately refused to cooperate, stating that the proposed investigation was |
not covered by the MLAT. Further, the Head of the Russian Military Forecasting Centre |
stated that the attacks against Estonia had not violated any international agreements because |
no such agreements exist (Alo 2007; Sobrale 2007). A pro-Kremlin youth movement called |
The Commissar of the Nashi, claimed responsibility for some of the attacks |
however, the |
group is located within Moldova and Transnistria which are beyond the jurisdiction of |
Interpol and no MLAT applies. This severely hampers the investigation as pursuing all-EU |
arrest warrants for these suspects would be largely a symbolic gesture (Commissar of Nashi |
2007; Estonia Fines Man for 'Cyber War' 2008; Ministry of Internal Affairs 2007). |
International Publicity |
Regardless of whether the attacks were state-sponsored, the Estonian incident brought cyber |
warfare to the attention of the global community. The case was studied intensively by many |
countries and military planners, since it was believed to have been state-sponsored and a |
modern example of a large-scale attack. Experts from the North Atlantic Treaty Organization |
(NATO), the European Commission, and organisations from the US and Israel were |
dispatched to offer assistance and collect first hand analysis of the event. The implications |
are far reaching: |
For NATO, the attack may lead to a discussion of whether it needs to |
modify its commitment to collective defense, enshrined in Article V of the North Atlantic |
Treaty |
(Landler and Markoff 2007). There is no precedence for an attack of this type. If a |
state |
s communications centre is attacked by a missile, it is considered an act of war. But |
what is the response to a cyber attack on that same installation, with the same debilitating |
effect? The Estonian attacks have encouraged the development of a NATO Cybernetic |
Defence Centre in Estonia. This is an extension of Estonia |
s 1996 push for the expansion of |
computer and network infrastructure in Estonia, nicknamed the Tiger |
s Leap (Bright 2007; A |
Cyber-Riot 2007; Estonia Has No Evidence of Kremlin Involvement 2007). |
Georgia |
The 2008 war between Russia and Georgia over South Ossetia appeared to mirror the |
Estonian attacks, hinting that cyber warfare may become a standard addition to traditional |
warfare, whether that be state-sponsored or not. Hours after fighting broke out, |
Russian |
hackers had established a site, StopGeorgia.ru, where visitors could view a list of Georgian |
websites being targeted, showing which sites had been successfully brought down, and |
download a simple program that enabled their own computer to join the attack |
(Waterman |
2008). The attacks included DDoS attacks from six different botnets against government and |
news websites, webpage defacements, spamming, the distribution of Georgian officials |
email addresses, and distribution of a list of Georgian websites with known security flaws. |
The level of sophistication and intensity of the Georgian attacks surpassed that of the |
Estonian attacks, showing that capability is increasing. Russian-based hackers tried to halt |
the Georgian hacker community from responding, by taking down the two highest-profile |
Georgian hacker sites, hacker.ge and warez.ge, in their initial assault (Waterman 2008). |
However, Georgian hackers did respond, going after Russian news sites, and in some cases, |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.