X
Edition:
United States

  • Business
    • Business Home
    • Legal
    • Deals
    • Aerospace & Defense
    • Finance
    • Autos
    • Reuters Summits
    • ADventures
    • Data Dive
  • Markets
    • Markets Home
    • U.S. Markets
    • European Markets
    • Asian Markets
    • Global Market Data
    • Indices
    • Stocks
    • Bonds
    • Currencies
    • Commodities
    • Futures
    • Funds
    • Earnings
    • Dividends
  • World
    • World Home
    • U.S.
    • Special Reports
    • Reuters Investigates
    • Euro Zone
    • Middle East
    • China
    • Japan
    • Mexico
    • Brazil
    • Africa
    • Russia
    • India
  • Politics
    • Politics Home
    • Polling Explorer
    • Live: Trump's First 100 Days
    • What Voters Want
    • Supreme Court
  • Tech
    • Technology Home
    • Science
    • Top 100 Global Innovators
    • Media
    • Environment
    • Innovation
  • Commentary
    • Commentary Home
    • Podcasts
  • Breakingviews
    • Breakingviews Home
    • Breakingviews Video
  • Money
    • Money Home
    • Retirement
    • Lipper Awards
    • Analyst Research
    • Stock Screener
    • Fund Screener
  • Life
    • Health
    • Sports
    • Arts
    • Entertainment
    • Oddly Enough
  • Pictures
    • Pictures Home
    • The Wider Image
    • Photographers
    • Focus 360
  • Video
Misunderstanding Cyberwar in Georgia
  • Africa
    América Latina
  • عربي
    Argentina
  • Brasil
    Canada
  • 中国
    Deutschland
  • España
    France
  • India
    Italia
  • 日本
    México
  • РОССИЯ
    United Kingdom
  • United States
China | Sat Aug 16, 2008 | 1:50pm EDT

Misunderstanding Cyberwar in Georgia

File image of a person using a computer. REUTERS/Sherwin Crasto
File image of a person using a computer. REUTERS/Sherwin Crasto

(Ethan Zuckerman is a fellow at the Berkman Center for Internet and Society and a co-founder of Global Voices Online. He wrote the following commentary for Reuters.com. The opinions expressed are his own.)

By Ethan Zuckerman

LANESBOROUGH, Mass. (Reuters.com) - There's nothing like the term "cyberwar" to capture a reader's attention.

For those who grew up on "Wargames", "Sneakers" or William Gibson novels, the term conjures up images of heroic hackers in shadowy basements, frantically tapping on keyboards in a life and death struggle against the enemy on the other side of the glowing CRT screen.

It's a vision that was compelling to senior people in the US Air Force, including former USAF Secretary Michael Wynne, who was fired earlier this year over the scandal of mishandled nuclear weapons. Before his departure, Wynne launched the Air Forces's "Cyberspace Command" with a television ad that portrayed the Air Force as the defender of the Pentagon against an onslaught of digital attacks.

The Pentagon has stopped funding and now may cancel the initiative. Wynne argues that the current military faceoff between Georgia and Russia over South Ossetia is an instance of cyberwar, saying "The Russians just shot down the government command nets so they could cover their incursion.

This was really one of the first aspects of a coordinated military action that had cyber as a lead force, instead of sending in air planes."

(For more click here )

That's the sort of speculation tech reporters live for. It raises the possibility that, instead of reporting on venture capital deals and the kudzu-like spread of Facebook, they might get the chance to be war reporters without the complication of being shot at.

In the past week, in-depth articles on cyberwar have graced the pages of the Washington Post, the New York Times, Christian Science Monitor, and Salon. The best of these articles have a common conclusion: it's very hard to know what's actually gone on.

Call it "the fog of cyberwar". Better yet, please don't.

As the dust settles, it's unclear whether "cyberwar" is even an appropriate term for what's taken place online as an actual war - the kind with guns and dead people - has transpired in Georgia.

It's worth remembering that in this "cyberwar", the most serious consequence is that a website becomes temporarily inaccessible to viewers.

It's a war being fought with paintballs, not with live rounds.

Here's what's known: many Georgian websites have been difficult or impossible to access for several days. In response, the Georgian government has moved some vital email addresses and websites to Google, and other Georgian websites have sought help from Estonia.

Here's what's not known: whether these attacks were directed by the Russian military, as Georgia's Foreign Minister has speculated, by shadowy criminal gangs, or just by kids with a grudge against Georgia and too much free time.

The last of these scenarios is looking increasingly likely.

Some of the most dramatic reports of cyberwar have come from an anonymous blog (RBNexploit) that tracks the Russian Business Network. RBN is a source of great concern to many in the computer security community - it's a very successful producer of tools used for spam, identity theft and malware.

The RBNexploit bloggers asserted that RBN hackers - on behalf of the Russian government - had taken control of backbone routers that delivered traffic to Georgia via Turkey, effectively cutting Georgia off from the Internet.

(For more click here )

While this would have been dramatic and exciting, it doesn't appear to be true. Earl Zmijewski, a vice president at Internet monitoring company Renesys, has been watching connections into Georgia very closely and reports, "During the hostilities, we've seen no significant changes in routing. In particular, we saw no apparent attempts to limit traffic via Russia, but then again, most traffic from Georgia seems to currently transit Turkey. "

(For more click here )

What's knocked some Georgian websites offline are denial of service attacks.

These attacks are the equivalent of harassing a person by calling her on the phone as often as possible and hanging up when she answers.

On the web, this involves sending a request to a web server over and over, hoping to overwhelm it and make it incapable of serving pages to legitimate users.

In a more sophisticated version of the attack, dozens or hundreds of people call the same number - load the same webpage - which might make even a modest-sized corporation impossible to reach for the duration of the attack.

These more complex attacks are called distributed denial of service attacks (DDoS), and they have become frustratingly common since CERT (Carnegie Mellon's Computer Emergency Response Team) first warned of them in 1999.

(For more click here )

It requires very little technical expertise to carry out a simple DoS attack - hit reload on your web browser every few seconds and you'll be carrying out an (ineffective, primitive) attack.

Belarussian tech journalist Evgeny Morozov was curious how much technical skill it would require to participate in a more organized attack. In a brilliant article for Slate, he describes visiting sites like StopGeorgia.ru, where he discovered a webpage that, saved to his desktop and opened in a browser, made thousands of requests an hour to 18 Georgian websites. Presto - "cyberwar" for dummies.

A bit more poking led him to a set of instructions for DoSHTTP, a utility that can easily be misused to perform efficient denial of service attacks.

(For more click here )

The technical solutions Morozov found weren't especially sophisticated - one relied on a dozen lines of Javascript code, the other on a widely available off-the-shelf tool.

These attacks can be effective not because they're using especially sophisticated technology, but because they leverage a "social hack" - they rely on the actions of individual, patriotic Russians organized via sites like StopGeorgia, which hosts a "scoreboard" displaying which Georgian sites are reachable and unreachable.

Look too hard for shadowy political forces and esoteric technology and, he notes, "we risk underestimating the great patriotic rage of many ordinary Russians, who, having been fed too much government propaganda in the last few days, are convinced that they need to crash Georgian Web sites.

Many Russians undoubtedly went online to learn how to make mischief, as I did." (Morozov is very clear that his sympathies don't lie with the Russians in this conflict, and that his attacks were conducted very briefly, for research purposes.)

The attacks on Georgian websites are probably not just coming from angry Russians hitting reload.

Some are likely coming from "botnets", large sets of computers that have been infected with malware, software that allows a computer to be controlled remotely by a third party. Russian hacker network RBN controls one network, the Storm botnet, but many others exist.

It's now possible to "rent" a botnet - Bill Woodcock of Internet research consultancy Packet Clearing House estimates that botnets can be rented to perform DDoS attacks for as little as four cents per machine.

It's possible that some hackers have rented botnets and turned them against Georgian websites, or that some operators have decided to "donate" attacks to the anti-Georgian cause.

The rhetoric of "cyberwarfare" has a reassuring implication: we understand how to fight wars, so surely we can win a cyberwar.

Unfortunately, the truth is more complicated.

There's no magic "cyberspace command" solution the USAF can unleash to defeat a botnet.

The administrators trying to bring Georgian webservers back online are doing precisely what any sysadmin does confronted with a DDoS - they are blocking traffic from the IP addresses that are launching the attacks, and sharing these blocklists with administrators confronting the same problems.

If they can block addresses more quickly than the attackers can recruit more participants, they'll win.

This strategy is known by the complex technical term "Whack-a-Mole", and it's roughly as frustrating as the fairground game of the same name.

What's frightening about the online attacks against Georgia is not that they're organized by shadowy Kremlin forces, but that they're coming from a loosely organized group of individuals.

In his new book "Here Comes Everybody", Clay Shirky notes that one of the characteristics of the contemporary Internet is that it enables "ridiculously easy group formation."

Once formed, these groups can organize potluck dinners or spread propaganda.

Chinese netizens, angered by what they perceived as anti-China bias in western media, organized a campaign to challenge media narratives on sites like Anti-CNN.com.

Individuals have flooded YouTube with videos exposing errors in CNN's and BBC's China coverage and arguing that Tibet is a part of a multi-ethnic, federated China.

Most Western media reports assume this effort is organized by the Chinese government, a charge participants angrily deny.

The shift from a world where power comes solely from governments and militaries to one where power can come from loosely organized, adhoc groups is a hard one to grasp.

It's easy to understand why the press and the military would misunderstand the situation in Georgia as a new type of military attack.

The truth may be more intriguing and frightening.

We've entered an era where individuals can organize their own "cyberwar" campaigns online, in concert with or in opposition to their governments.

(Find more from Ethan Zuckerman on his blog www.ethanzuckerman.com/blog/ )

Next In China

China expels 32 South Korea missionaries amid missile defense tension

SEOUL China has expelled 32 South Korean Christian missionaries, a Korean government official said on Saturday, amid diplomatic tension between the two countries over the planned deployment of a U.S. missile defense system in the South.

China gets an early win off Trump, but many battles remain

BEIJING Combining public bluster with behind-the-scenes diplomacy, China wrested a concession from the United States as the two presidents spoke for the first time this week, but Beijing may not be able to derive much comfort from the win on U.S. policy toward Taiwan.

Trump changes tack, backs 'one China' policy in call with Xi

BEIJING/WASHINGTON U.S. President Donald Trump changed tack and agreed to honor the "one China" policy during a phone call with China's leader Xi Jinping, a major diplomatic boost for Beijing which brooks no criticism of its claim to self-ruled Taiwan.

MORE FROM REUTERS

Sponsored Content

From Around the WebPromoted by Revcontent

Trending Stories

    Pictures

    Photos of the week

    Sponsored Topics

    X
    Follow Reuters:
    • Follow Us On Twitter
    • Follow Us On Facebook
    • Follow Us On RSS
    • Follow Us On Instagram
    • Follow Us On YouTube
    • Follow Us On LinkedIn
    Subscribe: Feeds | Newsletters | Podcasts | Apps
    Reuters News Agency | Brand Attribution Guidelines | Careers

    Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Learn more about Thomson Reuters products:

    Eikon
    Information, analytics and exclusive news on financial markets - delivered in an intuitive desktop and mobile interface
    Elektron
    Everything you need to empower your workflow and enhance your enterprise data management
    World-Check
    Screen for heightened risk individual and entities globally to help uncover hidden risks in business relationships and human networks
    Westlaw
    Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology
    ONESOURCE
    The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs
    CHECKPOINT
    The industry leader for online information for tax, accounting and finance professionals

    All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.

    • Site Feedback
    • Corrections
    • Advertising Guidelines
    • Cookies
    • Terms of Use
    • Privacy Policy