[Infowarrior] - 10 easy steps to writing the scariest cyberwarfare article ever

Richard Forno rforno at infowarrior.org
Tue Apr 14 11:29:13 UTC 2009


(That is one of the most brilliant assessments about media cyberwar  
coverage I've seen in the MSM in a long time.  Frankly I'm surprised  
it showed up in Foreign Polocy and not in some of the "hacker"- 
oriented security sites I frequent. Excellent post! ---rf)


10 easy steps to writing the scariest cyberwarfare article ever
Evgeny Morozov
Sat, 04/11/2009 - 5:57am

http://neteffect.foreignpolicy.com/posts/2009/04/11/writing_the_scariest_article_about_cyberwarfare_in_10_easy_steps

With daily reports of severe breaches in national cybersecurity and  
devastating cyber-attacks on government infrastructure, many  
journalists are in dire need of a manual to enlighten their writing on  
the subject. Here are my ten(rather cynical) tips to make your  
cyberwarfare story succeed.

1. You need a catchy title. It pays to cannibalize on some recent  
tragic event from the real world; adding "cyber" to its name would  
usually trigger all the right associations. Studies show that  
references to "digital Pearl Harbor","cyber-Katrina", and "electronic  
9/11" are most effective, particularly for stories involving  
electricity grids or dams. Never make any explicit attempts to explain  
the bizarre choice of your title– you need to leave enough ambiguity  
out there for your readers to "connect the dots" themselves. This is a  
win-win: readers love solving important cyberspy puzzles - and you  
could get away without doing any analysis of your own. Quoting real  
facts would spoil the puzzle-solving experience; plus, the fewer facts  
you quote, the harder it would be to debunk your story!

2. Begin the story in Estonia, with a reference to its 2007 attacks;  
make sure to play up the “E-stonia” tune and how the entire country  
was under online siege for a month (never mention that rioting in the  
Estonian streets was much more devastating and that the actual online  
siege lasted for twenty minutes at best). Setting the story in Estonia  
would also help to play up the Soviet threat that never really left  
the country. Blame NATO's impotence, praise Skype's genius, quote non- 
existent local Web entrepreneurs who lost all their savings in the  
2007cyber-attacks.

3. Drop references to the evil Chinese hackers in every paragraph (in  
every sentence, if it's an article about GhostNet) . Don't forget to  
mention that cyberwarfare was first explained by Sun Tzu and has been  
part of the Chinese military tradition since the Shang dynasty. Make  
unverifiable claims about the tacit support that the Chinese  
government has offered to its nationalist hackers. Find and quote a  
Chinese blogger who can't log-in to his blog; quote from a recent  
Pentagon review of China's military power to explain why this may all  
be part of China's grand cyberwarfare strategy.

4. Mention the cyber-pranks of as many Kremlin-affiliated youth  
movements as you can, all the better if they are obscure or only exist  
on paper. Anyone whose last name ends in "-ov" or "-ev" qualifies as a  
Kremlin bigwig; use their every sneeze as an extremely accurate  
articulation of Kremlin's own thinking on cyberwarfare. Keep  
referencing shady Russian outlets like the Russian Business Network;  
the fact that they have not been in the news in 2007 only proves they  
are doing a great job in the cyber-underground.

5. Find and quote industry experts with the biggest possible conflicts  
of interest – preferably those who make their living thanks to the  
public paranoia about cybersecurity. Make sure you give them enough  
space to quote their latest anti-virus solutions and consulting  
services. Since nobody important would talk to you on the record  
anyway, nobody expects your quotes to add any value to the article.  
Remember: it's all about the metaphors. Ideally, find "unbiased"  
experts who have never been to Estonia or Georgia, don't know the  
language, have gathered no data of their own, but who think that  
cyberwar is going to destroy us all (unless their firm is selected to  
help us save us from the evil hackers).

6. If you don't have any new facts to warrant yet another story on the  
subject, go and recycle old facts, quotes, and official statements;  
you are allowed to go back as early as 1997. In the worst case, give a  
call to some disgruntled dissident group with an ax to grind and ask  
if they feel threatened by the Chinese hackers (bonus points if you  
manage to find someone scared of Burma's junta); if they aren't, make  
sure to infect them with Conficker and call back shortly. Otherwise,  
call BBC to learn how to rent a botnet, pay for it with your corporate  
credit card, and launch a full-blown attack on some high-profile site,  
preferably the one that belongs to the dissident group you spoke to.  
Document your every step.

8. If you are still having trouble working the Chinese or the Russian  
governments into your story, why not throw in some geopolitical  
kerfuffle that involves a country located in between? Not only would  
it implicate both governments, it would also make cyberspace seem  
relevant to geopolitics. I suggest you settle on Kyrgyzstan, as it  
would also help to make a connection to the US military bases; there  
is no better story than having Russian and Chinese hackers oust the US  
from Kyrgyzstan via cyber-attacks. Bonus points for mentioning  
Azerbaijan and the importance of cyberwarfare to the politics of the  
Caspian oil; in the worst case, Kazakhstan would do as well. Never  
mention any connectivity statistics for the countries you are writing  
about: you don't want readers to start doubting that someone might be  
interested in launching a cyberwar on countries that couldn't care  
less about the Internet.

9. Anything involving cyberwar between Israel and Palestine is fair  
game, no matter how old and how unrelated to cyberwarfare. Don't  
forget to mention "e-Palestine" as an example of a nation in cyber- 
exile; throw in occasional references to Israeli Web start-ups.  
Eventually, blame everything on the growing appreciation of cyberspace  
by Iran's mullahs or at least local branch of Hamas (also –Hezbollah).  
The big prize is alluding to a secretive summer camp on cyberwarfare,  
where hackers from Russia, China, Iran, and Israel get together to  
share tricks.

10. Make sure to mention that NSA,CIA, and DIA are all involved in the  
case, but they cannot comment. Play up the inter-agency squabble and  
mention that the military types are angry with the spies– and vice  
versa. Mention that the Pentagon has already been attacked a gazillion  
times; blame everything on Rumsfeld and his penchant for network- 
centric warfare (no need to explain it; networks=attacks, for most  
readers anyway).Include a silly but long quote from a government  
insider, preferably someone who has been out of the Pentagon or the  
CIA for twenty years and has never seen a computer. Now is the good  
time to end the piece with a reference to a bipartisan report on  
cybersecurity from a Washington think-tank, predict Obama's failure to  
rule in cyberspace,and mention that Al-Queada recruits online. Bingo!


Mail it in – and wait to hear from the Pulitzer committee. I bet half  
of your readers would never want to use a computer again.


More information about the Infowarrior mailing list