Space Travel News  
The World's First Internet War

The U.S. Department of Homeland Security organizes America's Internet security; last month it sent a representative to Estonia to help analyze the large volume of data that was generated by the attacks. China is reportedly also planning to set up a cyber-defense system, and India wants to cooperate with France on several aspects of cybersecurity. Moreover, experts believe that most world powers also employ hackers that are able to launch and fend off Internet attacks like the one in Estonia.
by Stefan Nicola
UPI Correspondent
Berlin (UPI) Aug 06, 2007
The computer attack aimed at Estonia recently shows that the world can't ignore the dangers of cyberterrorism any longer. It was one of the biggest cyberattacks ever launched, and it nearly brought an entire country to its knees. On April 27, traffic on government and banking Web sites based in Estonia began to increase rapidly; by the next day, the hackers began to use Russian weblogs to spread the message and instigate further participation; by then, traffic had increased nearly 1,000 times, and virtually all Web sites were down. Some have called the attacks, which spread into May, the world's first Internet war.

The attack came at a time of frayed nerves. As it followed a diplomatic row between Estonia and Russia over the relocation of a Soviet war memorial in Tallinn, observers in Estonia and media reports initially accused the Russian government of having launched the assault.

Gadi Evron, a security technologist for Israel-based consultancy Beyond Security, told the Black Hat Web security conference last week that his analysis of the attacks indicates that the first wave of denial-of-service attacks against specific Web sites may have been triggered by the "Russian blogosphere" where angry Russians urged others to join the attack on Estonia. "They provided a tool for the entire population to use," Evron said, according to a report in PC World. The second phase of the attacks, in late May, was specifically crafted and more targeted, proving that sophisticated planning had been involved.

"OK, the KGB no longer exists," Evron said of the former Russian spy service, adding, however, that he found it "hard to believe it was a mere epidemic."

Of course, the Estonian case is a special one: Slightly smaller than New Hampshire and Vermont combined, nearly all of Estonia's economy relies on the Internet. Wireless and cable penetration is virtually complete -- every municipality is mandated to have a public Internet cafe, and the former Soviet republic even organized its parliamentary elections online. So while it is tough to speculate who was the mastermind behind the attacks, the target was definitely well-chosen.

James Andrew Lewis of the Washington-based Center for Security and International Studies, however, argues that there is a difference between real terror and the case of cyber-riots that rocked the former Soviet Republic.

"No one died or was injured, dams did not burst, planes did not crash, and electricity was uninterrupted," he wrote in a commentary for the Atlantic Community, an online platform for trans-Atlantic debate on key issues of international politics and globalization. "If the events in Estonia were made into a blockbuster movie, it would star hordes of road-clogging Teletubbies, not Bruce Willis."

Teletubbies and Bruce Willis aside -- the world's governments are getting ready to secure their cyberspace, especially as more and more information and government tools are moving to the Web.

The U.S. Department of Homeland Security organizes America's Internet security; last month it sent a representative to Estonia to help analyze the large volume of data that was generated by the attacks. China is reportedly also planning to set up a cyber-defense system, and India wants to cooperate with France on several aspects of cybersecurity. Moreover, experts believe that most world powers also employ hackers that are able to launch and fend off Internet attacks like the one in Estonia.

And while there are not many cases of cyberattacks to date, the Internet is nevertheless a playing ground for terrorists. Already, the core of Islamist terror groups launches sophisticated public relations campaigns via the Web. Moreover, one of the main recruiting tools for terror cells is the Internet, be it through e-mail traffic, Islamist blogs, chat rooms and information Web sites -- after all, the Web is the perfect hiding ground, as it guarantees anonymity.

"In information warfare, you may know your opponents, rivals, and enemies, but you do not know who is actually attacking," Evron said.

Source: United Press International

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


The New Face Of Identity Protection Is You
Houston TX (SPX) Aug 02, 2007
Trying to remember dozens of personal identification numbers (PIN), passwords and credit card numbers may not be necessary for much longer, thanks to a University of Houston professor and his team. Taking a radically new approach, UH Eckhard Pfeiffer Professor Ioannis Kakadiaris and his Computational Biomedicine Lab (CBL) developed the URxD face recognition software that uses a three-dimensional snapshot of a person's face to create a unique identifier, a biometric.







  • UC Experts Detail New Standard For Cleaner Transportation Fuels
  • Indigenous Cryogenic Stage Tested For Eight Minutes
  • Ecliptic Celebrates A Decade Of Successful RocketCam Launches
  • Launch Gantry At Cape A Bridge To The Future

  • A Double Transfer At The Spaceport For The Next Two Ariane 5 Launchers
  • European Automated Space Truck Arrive At South American Spaceport
  • India Plans To Double Satellite Launches Within Five Years
  • Spaceway 3 Is Delivered To The Spaceport For Its Mid-August Ariane 5 Launch

  • Countdown Underway For New NASA Shuttle Flight
  • Teacher Going Into Space 21 Years After Challenger Disaster
  • Weather Forecast Clear For Space Shuttle Endeavour Launch
  • Cabin Leak Threatens US Space Shuttle Launch

  • Progress Cargo Ship With Computer Equipment Docks With ISS
  • Progress 26 To Dock Sunday At Station
  • Russian Space Cargo Ship Progress Undocks From ISS
  • Progress To Launch To Space Station

  • Historic Phoenix Mars Mission Flies Actel RTAX-S Devices
  • Spaceport America Design Team Selected
  • Making the Transition From Shuttle To Constellation
  • Houston Wine Company Offers Wine Discount To NASA Astronauts

  • China Trains Rescue Teams For Third Manned Space Program
  • Chinese Astronauts Begin Training For Spacewalk
  • China Prepares To Select New Taikonauts
  • Dongfanghong 4 Ready For More International Satellite Orders

  • Successful Jules Verne Rendezvous Simulation At ATV Control Centre
  • Robotic Einstein Wows Spanish Technology Fair
  • Robotic Ankle For Amputees Is Developed
  • iRobot Receives New Military Orders 14 PackBot Robots

  • NASA Sends Robotic Lander In Search Of Water And Life On Mars
  • Extreme Analytical Chemistry Will Help Unravel Mars Mysteries
  • NASA Spacecraft Heads For Polar Region Of Mars
  • Next Departure For Mars Stands Ready To Fly

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement