Russia's cyber blockade of Georgia worked. Could it happen here?
Lesson learned: DDoS attacks, as well as the response to them, can cripple a country
Computerworld - The Russian and Georgia war last August began in cyberspace with sporadic denial-of-service attacks, targeted primarily at news and government Web sites weeks before the shooting started. And at first, says Eka Tkeshelashvili, secretary of the National Security Council of Georgia, the government wasn't certain what to make of it.
Georgian officials believed it was an effort by Russia to apply psychological pressure on the country and cause some disruption, "but not to the extent that the whole banking system would have been shut off, crippling the economy," says Tkeshelashvili.
But that's exactly what happened. As armed hostilities began, the distributed denial-of-service (DDoS) attacks increased in severity, making news and government Web sites impossible to reach. Banks shut down servers to protect themselves from the theft of data, but a flood of false information and erroneous IP packets presumably originated in Russia triggered an automated response from international banks to sever connections to the country.
By itself, the DDoS attack was shutting down Georgia's ability to reach the world, but the problem was compounded by the reaction to the attack from financial institutions. Combined, these actions had one result: The Russians had succeeded in isolating Georgia.
In taking Georgia offline, the Russians had the Internet, in a sense, to themselves. In the initial days of the fighting, the Russian news media could present its version of the war while the Georgians dealt with what amounted to a cyber blockade.
"There is no way that Georgia could do anything at all to stop or reverse the military defeat that was staring it in the face," says Patrick Worms, a communications adviser to the Georgian government at the time of the war. "The only thing it could do was generate global condemnation of this Russian move and global sympathy for its plight, he says. For that, it needed Internet access.
But this attack was intended "to make sure that the outside world couldn't see into Georgia and make sure Georgia couldn't get in touch with the outside world," says Tom Merilo, a retired information systems auditor from Canada's largest telecom, Bell, who was in Georgia after the war to help with technical efforts to improve the networks.
The main paths for network access into Georgia are through Russia and Turkey, Merilo says. Routers in Russia or otherwise outside Georgian control were hijacked and traffic rerouted, making even connecting to Internet-based e-mail accounts, such as Gmail, difficult to impossible.
Volunteers, many from outside Georgia, helped to set up mirror sites by redirecting domains to new hosting providers in other countries. For a time, Georgia's foreign ministry Web site was hosted on Google's Blogspot service. It was a "whatever works" approach, and within a few days of the initial attack, Georgia began regaining some ability to communicate, via the Internet, with the outside.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts