[Infowarrior] - 'Hacktivists' Update Their Mission

Richard Forno rforno at infowarrior.org
Wed Aug 27 01:28:42 UTC 2008


A New Breed of Hackers Tracks Online Acts of War
'Hacktivists' Update Their Mission

By Kim Hart
Washington Post Staff Writer
Wednesday, August 27, 2008; D01

http://www.washingtonpost.com/wp-dyn/content/article/2008/08/26/AR2008082603128_pf.html

TORONTO -- Here in the Citizen Lab at the University of Toronto, a new  
breed of hackers is conducting digital espionage.

They are among a growing number of investigators who spend their time  
monitoring how traffic is routed through various countries, where Web  
sites are blocked there and why it's all happening. Now they are  
turning their scrutiny to a new weapon of international warfare: cyber  
attacks.

Tracking wars isn't what many of the researchers, who call themselves  
"hacktivists," set out to do. Many began intending to help residents  
in countries that censor online content. But as the Internet has  
evolved, so has their mission.

Ronald J. Deibert, director of the Citizen Lab, calls the organization  
a "global civil society counterintelligence agency" and refers to the  
lab as the "NSA of operations."

Their efforts have ramped up in the past year as researchers gather  
evidence that Internet assaults are playing a larger role in military  
strategy and political struggles. Even before Georgia and Russia  
entered a ground war earlier this month, Citizen Lab's researchers  
noticed sporadic attacks aimed at several Georgian Web sites. Such  
attacks are especially threatening to countries that increasingly link  
critical activities such as banking and transportation to the Internet.

Once the fighting began, massive raids on Georgia's Internet  
infrastructure were deployed using techniques similar to those used by  
Russian criminal organizations. Then, attacks seemed to come from  
individuals who found online instructions for launching their own  
assaults, shutting down much of Georgia's communication system.

Now, two weeks later, the researchers are still trying to trace the  
origins of the attacks, but they are difficult to decipher. "These  
attacks in effect had the same effect that a military attack would  
have," said Rafal Rohozinski, who co-founded the Information Warfare  
Monitor, which tracks cyber attacks, with Citizen Lab in 2003. "That  
suddenly means that in cyberspace anyone can build an A-bomb."

The cyber attacks that disabled many Georgian and Russian Web sites  
earlier this month marked the first time such an assault coincided  
with physical fighting. And the digital battlefield will likely become  
a permanent front in modern warfare, Deibert said.

Seven years ago, Deibert opened the Citizen Lab using grant money from  
the Ford Foundation. Soon after, he and Rohozinski helped begin the  
OpenNet Initiative, a collaboration with Harvard's Law School, and  
Cambridge and Oxford universities, which tracks patterns of Internet  
censorship in countries that use filters, such as China. The project  
has received an additional $3 million in funding from the MacArthur  
Foundation. Deibert and Rohozinski also launched the Information  
Warfare Monitor to investigate how the Internet is used by state  
military and political operations. And Citizen Lab researchers have  
created a software tool called Psiphon that helps users bypass  
Internet filters.

The combined projects have about 100 researchers in more than 70  
countries mapping Web traffic and testing access to thousands of sites.

A number of companies specialize in cyber security, and several  
nonprofit organizations have formed cyber-surveillance projects to  
keep international vigil over the Web. Shadowserver.org, for example,  
is a group of 10 volunteer researchers who post their findings about  
cyber attacks online.

The small Toronto office of Citizen Lab serves as the technological  
backbone for the operations. World maps and newspaper clips cover the  
walls. Researchers move between multiple computer screens, studying  
lists of codes with results from field tests in Germany, Cambodia,  
Iran and Venezuela, to name a few.

"We rely on local experts to help us find out why a particular site is  
being blocked," Deibert said. It could be a problem with the Internet  
service provider, a temporary connection glitch or a downed server.  
"But what's more effective is blasting a site into oblivion when it is  
strategically important. It's becoming a real arms race."

He's referring to "denial of service" attacks, in which hundreds of  
computers in a network, or "botnets," simultaneously bombard a Web  
site with millions of requests, overwhelming and crashing the server.  
In Georgia, such attacks were strong enough to knock key sources of  
news and information offline for days.

And Georgian Internet service providers also limited access to Russian  
media outlets, cutting off the only remaining updates about the war.  
On the night of Aug. 12 -- the height of the fighting -- "there was  
panic in Tbilisi brought about by a vacuum of information," Rohozinski  
said.

Shadowserver saw the first denial of service attack against Georgia's  
presidential Web site on July 20. When the fighting began, Andre M. Di  
Mino, Shadowserver's founder, counted at least six botnets launching  
attacks, but it was "difficult to tell if it was a grass-roots effort  
or one commissioned by the government."

The organization detects between 30 and 50 denial of service attacks  
every day around the world, and Di Mino said they have become more  
sophisticated over the past two years.

"It really went from almost a kiddie type of thing to where it's an  
organized enterprise," he said. But he's hesitant to label this  
month's attacks as form of cyberwar, although he expects networks to  
play an expanded role in political clashes.

Jose Nazario, a security researcher with Arbor Networks, said cyber  
attacks used to target a computer's operating system. But he's seen a  
"tremendous rise" in attacks on Web browsers, allowing attackers  
access to much more personal information, such as which sites a person  
visits frequently. An attacker then could learn which servers to  
target in order to disrupt communication.

It's unclear who is behind the attacks, however. In some cases, the  
locations of botnet controllers can be traced, but it's impossible to  
know if an attacker is working on the behalf of another organization  
or government. "It's going to take a year to figure this out," Nazario  
said.

The data trail often goes cold when it crosses borders because there  
is little legal framework for such investigations. And many countries  
are still weighing whether a cyber attack is an act of war.

"If a state brings down the Internet intentionally, another state  
could very well consider that a hostile act," said Jonathan Zittrain,  
co-founder of Harvard's Berkman Center for Internet Society, and a  
principal investigator for the OpenNet Initiative.

There are also strategic reasons not to disrupt networks in order to  
monitor the enemy's conversations, or to spread misinformation.

"That's an amazing intelligence opportunity," he said.

Using the Internet to control information can be more important than  
disrupting the networks when it comes to military strategy, Rohozinski  
said. In Georgia, for example, the lack of access to both Georgian and  
Russian sources of information kept citizens in the dark while the  
fighting continued.

"Sometimes the objective is not to knock out the infrastructure but to  
undermine the will of the people you're fighting against," he said.  
"It's about the nuts and bolts, but it's also about how perceptions  
can be shaped through what's available and what's not."


More information about the Infowarrior mailing list