Space Industry and Business News  
Outside View: Cyberwar threat grows worse

Perhaps the single most serious threat to the Internet is the "botnet," which is a collection of hijacked computers forwarding viruses, spam or other malicious content without the knowledge of the computer owners.
by Lawrence Sellin
Washington (UPI) Oct 9, 2008
Viruses, worms, identity theft, extortion and other forms of criminal activity are not the only illicit uses of the Internet. "Malware" -- malicious software designed to exploit weaknesses in programs and the computers on which they run -- has now spawned the capability to digitally "soften up the battlefield."

The cyberattack has become a major weapon of psychological operations and information warfare in both hot and cold wars. It also will grow as a weapon of choice for transnational terrorists because it provides a relatively inexpensive means to disrupt global communications covertly and, in some cases, the ability to use our own computers against us.

According to the Shadowserver Foundation, an all-volunteer watchdog group of security professionals who gather, track and report malicious use of the Internet, on July 19, weeks before the Russian invasion of the Republic of Georgia, the Web site of Georgian President Mikheil Saakashvili was subjected to a distributed denial of service attack, rendering it unavailable for more than 24 hours.

On Aug. 8, the day after Georgian forces initiated a surprise attack on South Ossetian separatist forces, a cyberattack of Georgian government Web sites occurred in parallel to a Russian intervention in South Ossetia. These attacks included both denial of service and defacement of Web sites, such as inserting side-by-side images of Saakashvili and Adolf Hitler. Some Georgian government Web sites were under external control. Commercial sites such as banks were also targeted.

In the immediate aftermath of the Georgian-Russian conflict, independent security consultant and cyber-threats analyst Dancho Danchev concluded that these were coordinated attacks and similar to the denial of service attacks made against Estonia in April 2007, after the bronze memorial of a Soviet soldier was relocated.

Target lists of Georgian government Web sites were distributed among Russian Web forums. Denial of service tools were made available for download. Vulnerable Georgian Web sites were identified. Lists of Georgian politicians' e-mail addresses were provided for spamming and disruption of communications. In this way, sympathetic computer users are recruited to create mass attacks and enhance the effectiveness of these attacks.

Perhaps the single most serious threat to the Internet is the "botnet," which is a collection of hijacked computers forwarding viruses, spam or other malicious content without the knowledge of the computer owners.

Command and control -- C2 -- servers can direct these computers to send thousands of messages causing a denial of service like that seen in the Georgian and Estonian attacks. Such C2 servers can exist beyond the reach of law enforcement within rogue networks.

Just such a network was described by Brian Krebs in an October 2007 Washington Post article. The Russian Business Network offered hosting services and an apparent shelter for child pornography, spamming and identity theft and, in the process, carried out a major portion of global cybercrime and profiteering.

For a monthly fee of $600, 10 times the going rate, RBN provided "bulletproof" protection from regulation, allegedly by its connections to organized crime and bribing regulators. RBN has faded into the background as a result of pressure from Internet commercial interest -- not the government.

It is not clear, however, if RBN is indeed deceased or has simply shifted its operations elsewhere. In his thorough analysis of RBN operations, David Bizeul reported that Abdallah Internet Hizmetleri in Rize, Turkey, was used extensively and, at one time, reportedly was taken over by RBN.

Combining rogue networks with rogue nations could amount to a considerable threat to U.S. national security.

Eli Jellenc, manager of All-Source Intelligence at iDefense, has best defined the extent of the problem precipitated by the Russian-Georgian conflict.

"The use of cyberattack assets in conjunction with kinetic military operations in the current crisis now stands among the most significant developments ever seen in the field of information security or cyber-conflict studies."

(Lawrence Sellin, Ph.D., is a U.S. Army reservist and an Afghanistan veteran.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


EU scientists launch new, 'unbreakable' encryption system
Vienna (AFP) Oct 8, 2008
A new encryption system, which its creators say is unbreakable, got its first test run Wednesday in Vienna, scientists from the European Union project SECOQC announced.







  • Google adds computer games to online advertising kingdom
  • Web traffic jam as people search for financial news
  • Apple to unveil new laptop computers
  • Gadget sales thrive during economic storm: CEA

  • New ASTRA 1M Satellite To Be Launched On 31 October
  • Ariane 5 Is Readied For A Dual-Payload Mission
  • India To Have New Launchpad For Proposed Manned Mission
  • Arianespace Flight 186 Set For End Of November

  • Researchers Scientists Perform High Altitude Experiments
  • Airbus expecting 'large' China order by early 2009: CEO
  • Airbus globalises production with China plant
  • Safer Skies For The Flying Public

  • Raytheon Reaches Milestone On Critical Communications Capability
  • Raytheon Awarded First Phase Of Integrated Battle Command System
  • Airman Provides Air Support For Army Battlespace
  • The Modern Airborne Military Communications Market

  • MSV Awarded Patents For Next-Gen Satellite-Terrestrial Comms Network
  • Youngsters Flying High After Winning Top UK Space Competition
  • Theory Explains Mysterious Nature Of Glass
  • Coating may mean sleeker planes

  • Berndt Feuerbacher New President Of IAU
  • Orbital Appoints Frank Culbertson And Mark Pieczynski To Management
  • Chris Smith Named Director Of Cerro Tololo Inter-American Observatory
  • AsiaSat Appoints New General Manager China

  • Maps Shed Light On CO2's Global Nature
  • 2008 Ozone Hole Larger Than Last Year
  • Smog Blog For Central America And Caribbean Debuts
  • Infoterra Enhances Capability With Acquisition Of Imass

  • Spatially Manage And Optimize Fleet Operations With ArcLogistics 9.3
  • SiRFlinkIII Combo Radio IC To Drive Next-Gen Mobile Convergence Devices
  • RealEstate.com Launches RealEstate.com Mobile
  • TomTom Fuel Price Service Now Available At Retail

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement