Russia's cyber blockade of Georgia worked. Could it happen here?
Lesson learned: DDoS attacks, as well as the response to them, can cripple a country
Computerworld - The Russian and Georgia war last August began in cyberspace with sporadic denial-of-service attacks, targeted primarily at news and government Web sites weeks before the shooting started. And at first, says Eka Tkeshelashvili, secretary of the National Security Council of Georgia, the government wasn't certain what to make of it.
Georgian officials believed it was an effort by Russia to apply psychological pressure on the country and cause some disruption, "but not to the extent that the whole banking system would have been shut off, crippling the economy," says Tkeshelashvili.
But that's exactly what happened. As armed hostilities began, the distributed denial-of-service (DDoS) attacks increased in severity, making news and government Web sites impossible to reach. Banks shut down servers to protect themselves from the theft of data, but a flood of false information and erroneous IP packets presumably originated in Russia triggered an automated response from international banks to sever connections to the country.
By itself, the DDoS attack was shutting down Georgia's ability to reach the world, but the problem was compounded by the reaction to the attack from financial institutions. Combined, these actions had one result: The Russians had succeeded in isolating Georgia.
In taking Georgia offline, the Russians had the Internet, in a sense, to themselves. In the initial days of the fighting, the Russian news media could present its version of the war while the Georgians dealt with what amounted to a cyber blockade.
"There is no way that Georgia could do anything at all to stop or reverse the military defeat that was staring it in the face," says Patrick Worms, a communications adviser to the Georgian government at the time of the war. "The only thing it could do was generate global condemnation of this Russian move and global sympathy for its plight, he says. For that, it needed Internet access.
But this attack was intended "to make sure that the outside world couldn't see into Georgia and make sure Georgia couldn't get in touch with the outside world," says Tom Merilo, a retired information systems auditor from Canada's largest telecom, Bell, who was in Georgia after the war to help with technical efforts to improve the networks.
The main paths for network access into Georgia are through Russia and Turkey, Merilo says. Routers in Russia or otherwise outside Georgian control were hijacked and traffic rerouted, making even connecting to Internet-based e-mail accounts, such as Gmail, difficult to impossible.
Volunteers, many from outside Georgia, helped to set up mirror sites by redirecting domains to new hosting providers in other countries. For a time, Georgia's foreign ministry Web site was hosted on Google's Blogspot service. It was a "whatever works" approach, and within a few days of the initial attack, Georgia began regaining some ability to communicate, via the Internet, with the outside.
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Protection for Every Enterprise: How BlackBerry 10 Security Works
- Get an IT-level review of BlackBerry® 10 Security, addressing data leakage protection, certified encryption, containerization and much more.
- Manage Virtualized and Cloud Environments and the New Software-defined Data Center
- Analyst report by Enterprise Management Associates on the newly announced EMC Service Assurance Suite, and how well it addresses operational challenges and market...
- How Storage Resource Management Suite Meets Today's Storage Management Challenges
- This white paper outlines the common use cases Storage Resource Management Suite addresses including comprehensive monitoring, reporting, and analysis for heterogeneous block, file,...
- Sepaton DBeXstream Enhancements
- Silverton Consulting weighs in on why Sepaton is a compelling response to the data protection challenges inherent in today's large enterprise database environments... All Government IT White Papers
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity.
- Content Analytics: Big Data Conquered, Customer Service Elevated
- For organizations looking to start a content analytics program or improve their existing capabilities, Aberdeen Group and IBM will lay out several recommendations... All Government IT Webcasts