[Infowarrior] - So-called cyberattack was overblown
Richard Forno
rforno at infowarrior.org
Mon Jul 13 11:17:43 UTC 2009
So-called cyberattack was overblown
by Bruce Schneier
July 13, 2009
http://minnesota.publicradio.org/display/web/2009/07/10/schneier/
To hear the media tell it, the United States suffered a major
cyberattack last week. Stories were everywhere. "Cyber Blitz hits
U.S., Korea" was the headline in Thursday's Wall Street Journal. North
Korea was blamed.
Where were you when North Korea attacked America? Did you feel the
fury of North Korea's armies? Were you fearful for your country? Or
did your resolve strengthen, knowing that we would defend our homeland
bravely and valiantly?
My guess is that you didn't even notice, that - if you didn't open a
newspaper or read a news website - you had no idea anything was
happening. Sure, a few government websites were knocked out, but
that's not alarming or even uncommon. Other government websites were
attacked but defended themselves, the sort of thing that happens all
the time. If this is what an international cyberattack looks like, it
hardly seems worth worrying about at all.
Politically motivated cyber attacks are nothing new. We've seen U.K.
vs. Ireland. Israel vs. the Arab states. Russia vs. several former
Soviet Republics. India vs. Pakistan, especially after the nuclear
bomb tests in 1998. China vs. the United States, especially in 2001
when a U.S. spy plane collided with a Chinese fighter jet. And so on
and so on.
The big one happened in 2007, when the government of Estonia was
attacked in cyberspace following a diplomatic incident with Russia
about the relocation of a Soviet World War II memorial. The networks
of many Estonian organizations, including the Estonian parliament,
banks, ministries, newspapers and broadcasters, were attacked and --
in many cases -- shut down. Estonia was quick to blame Russia, which
was equally quick to deny any involvement.
It was hyped as the first cyberwar, but after two years there is still
no evidence that the Russian government was involved. Though Russian
hackers were indisputably the major instigators of the attack, the
only individuals positively identified have been young ethnic Russians
living inside Estonia, who were angry over the statue incident.
Poke at any of these international incidents, and what you find are
kids playing politics. Last Wednesday, South Korea's National
Intelligence Service admitted that it didn't actually know that North
Korea was behind the attacks: "North Korea or North Korean
sympathizers in the South" was what it said. Once again, it'll be kids
playing politics.
This isn't to say that cyberattacks by governments aren't an issue, or
that cyberwar is something to be ignored. The constant attacks by
Chinese nationals against U.S. networks may not be government-
sponsored, but it's pretty clear that they're tacitly government-
approved. Criminals, from lone hackers to organized crime syndicates,
attack networks all the time. And war expands to fill every possible
theater: land, sea, air, space, and now cyberspace. But cyberterrorism
is nothing more than a media invention designed to scare people. And
for there to be a cyberwar, there first needs to be a war.
Israel is currently considering attacking Iran in cyberspace, for
example. If it tries, it'll discover that attacking computer networks
is an inconvenience to the nuclear facilities it's targeting, but
doesn't begin to substitute for bombing them.
In May, President Obama gave a major speech on cybersecurity. He was
right when he said that cybersecurity is a national security issue,
and that the government needs to step up and do more to prevent
cyberattacks. But he couldn't resist hyping the threat with scare
stories: "In one of the most serious cyber incidents to date against
our military networks, several thousand computers were infected last
year by malicious software -- malware," he said. What he didn't add
was that those infections occurred because the Air Force couldn't be
bothered to keep its patches up to date.
This is the face of cyberwar: easily preventable attacks that, even
when they succeed, only a few people notice. Even this current
incident is turning out to be a sloppily modified five-year-old worm
that no modern network should still be vulnerable to.
Securing our networks doesn't require some secret advanced NSA
technology. It's the boring network security administration stuff we
already know how to do: keep your patches up to date, install good
anti-malware software, correctly configure your firewalls and
intrusion-detection systems, monitor your networks. And while some
government and corporate networks do a pretty good job at this, others
fail again and again.
Enough of the hype and the bluster. The news isn't the attacks, but
that some networks had security lousy enough to be vulnerable to them.
Bruce Schneier is a security technologist. His latest book is
"Schneier on Security."
More information about the Infowarrior
mailing list