Russia's cyber blockade of Georgia worked. Could it happen here?
Lesson learned: DDoS attacks, as well as the response to them, can cripple a country
Computerworld - The Russian and Georgia war last August began in cyberspace with sporadic denial-of-service attacks, targeted primarily at news and government Web sites weeks before the shooting started. And at first, says Eka Tkeshelashvili, secretary of the National Security Council of Georgia, the government wasn't certain what to make of it.
Georgian officials believed it was an effort by Russia to apply psychological pressure on the country and cause some disruption, "but not to the extent that the whole banking system would have been shut off, crippling the economy," says Tkeshelashvili.
But that's exactly what happened. As armed hostilities began, the distributed denial-of-service (DDoS) attacks increased in severity, making news and government Web sites impossible to reach. Banks shut down servers to protect themselves from the theft of data, but a flood of false information and erroneous IP packets presumably originated in Russia triggered an automated response from international banks to sever connections to the country.
By itself, the DDoS attack was shutting down Georgia's ability to reach the world, but the problem was compounded by the reaction to the attack from financial institutions. Combined, these actions had one result: The Russians had succeeded in isolating Georgia.
In taking Georgia offline, the Russians had the Internet, in a sense, to themselves. In the initial days of the fighting, the Russian news media could present its version of the war while the Georgians dealt with what amounted to a cyber blockade.
"There is no way that Georgia could do anything at all to stop or reverse the military defeat that was staring it in the face," says Patrick Worms, a communications adviser to the Georgian government at the time of the war. "The only thing it could do was generate global condemnation of this Russian move and global sympathy for its plight, he says. For that, it needed Internet access.
But this attack was intended "to make sure that the outside world couldn't see into Georgia and make sure Georgia couldn't get in touch with the outside world," says Tom Merilo, a retired information systems auditor from Canada's largest telecom, Bell, who was in Georgia after the war to help with technical efforts to improve the networks.
The main paths for network access into Georgia are through Russia and Turkey, Merilo says. Routers in Russia or otherwise outside Georgian control were hijacked and traffic rerouted, making even connecting to Internet-based e-mail accounts, such as Gmail, difficult to impossible.
Volunteers, many from outside Georgia, helped to set up mirror sites by redirecting domains to new hosting providers in other countries. For a time, Georgia's foreign ministry Web site was hosted on Google's Blogspot service. It was a "whatever works" approach, and within a few days of the initial attack, Georgia began regaining some ability to communicate, via the Internet, with the outside.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.