FACIALLY LAWFUL SINCE 1998
email

EMAIL

MAYDAY IN AMERICA! SECRET THINGS CRIME SCENE NUTS AND EXTREMISTS
c

Longtime Battle Lines Are Recast In Russia and Georgia's Cyberwar

By Kim Hart

Washington Post Staff Writer

Thursday, August 14, 2008;

Page D01

As the violence unfolded between Russia and Georgia during the past week, hackers waged war on another front: the Internet. The Georgian government accused Russia of engaging in cyberwarfare by disabling many government Web sites, making it difficult to inform citizens quickly of important updates. Russia said that it was not involved and that its own media and official Web sites had suffered similar attacks.

Although a cease-fire has been ordered, major Georgian servers are still down, hindering communication in the country. Some Georgian officials, bloggers and citizens were able to work around the disruptions, sending text messages to friends in other countries using Web sites hosted by servers in the United States, Poland and Estonia that are less likely to fall victim to a cyberattack. Concerted online attacks have been a threat for years. But security experts say the "cyberwar" between Russia and Georgia underscores the havoc that can spread on a digital battlefield. It also highlights how vulnerable Web-reliant countries are to assaults that could cripple military communications or a national banking industry.

The attacks against Georgia's Internet infrastructure began nearly two months before the first shots were fired, according to security researchers who track Internet traffic into and out of the countries. Such attacks, known as "denial of service" attacks, are triggered when computers in a network are simultaneously ordered to bombard a site with millions of requests, which overloads a server and causes it to shut down. "In terms of the scope and international dimension of this attack, it's a landmark," said Ronald J. Deibert, director of the University of Toronto's Citizen Lab, which has nearly 100 researchers mapping Web traffic through several countries, including Russia and Georgia.

He said small-scale attacks have occurred between the countries since June. "International laws are very poorly developed, so it really crosses a line into murky territory . . . Is an information blockade an act of war?" Cyberattacks can be launched cheaply and easily, with a few hundred computers and a couple of skilled hackers. Simpler tactics are even easier to mount by hacking into a server and deleting files, reconfiguring settings and altering photos.

Compared with expensive military attacks, cyberwar tactics "seems like the kind of thing that a sophisticated military would want to experiment with," said Ben Edelman, assistant professor at Harvard Business School who has studied cyberattacks. "Imagine how devastating it would be to a military commander to lose access to a server that tells him where his troops are stationed and where he has resources," he said, adding that "this is the first time we've had such strong evidence of cyberwarfare."

Instructions on how to mount such attacks are readily available on blogs, making it easy for a grass-roots effort to quickly escalate into a crippling assault, said Evgeny Morozov, a technology consultant based in Berlin who has tracked blogs in Georgia and Russia. Figuring out who is behind the attacks has been difficult, Deibert said, because of complex routing methods and a multitude of connection exchanges.

The Internet's infrastructure is a maze of lines laid by different service providers traversing many countries, masking how information is traveling -- or blocked. "It's an ongoing battle in documenting where it's coming from and helping people get around it," he said.

In Georgia, which is not as dependent on the Internet as other nations, the cyberattack mainly hindered the government's ability to communicate with its citizens and others during the fighting. The Georgian Foreign Ministry's Web site, for example, was disabled except for a collage that compared Georgian President Mikheil Saakashvili to Adolf Hitler.


 

 

 

 

 

 

 

 

 

 

 

 

"ONLY ONE TRIBUNAL THAT EVER ADOPTED A PRACTICE OF FORCING COUNSEL UPON AN UNWILLING DEFENDANT IN A CRIMINAL PROCEEDING. THE TRIBUNAL WAS THE STAR CHAMBER." U.S. v FARETTA , 422 US 806 (1975)

OUTSIDE IT'S AMERICA.

WHAT WOULD BE THE CAPACITY OF LAW ENFORCEMENT AND OF THE COURTS TO SUPRESS THIS KIND OF SPEECH?" --Judge A. Howard Matz, PRE-TRIAL OF KILLERCOP

FAKE NEWS - LIAR

EPIC CORRUPTION EXPOSED IN THE SECRET TRIAL OF KILLERCOP.com.

ANOTHER PERSONPERSON OF ANOTHER

Look, you know you have to look, there!! ABOVE!! It's "a person, on the left," and "the person of another," on the right.

Do you understand?

NO?

ARE YOU STILL BAFFFLED?

WIKI

WOUNDED WIKI

FAQ 1 FAQ 2

FACEBOOK AND THE TWITTER

YOUTUBE

Battle Lines

 

 

ALEX KOZINSKI COMMITS AND COVERED UP CRIMES

THEY ALL IGNORED THEIR OATHS, THE FACTS, THE RULES THE LAW AND THE 5TH AND 6TH AMENDMENTS AND PROCEEDED FORWARD WITH A SELECTIVVE PERSECUTION IN A SECRET HEARING.

A COVER UP BY JUDGE ALEX KOZINSKI

POD SERVER

Sponsored By Psych Ward Entertainment.

TERMS OF USE

DISCLAIMER

PRIVACY POLICY

Copyright 1997-2022

THIS PREMIUM DOMAIN NAME IS FOR SALE.

EMAIL KILLERCOP

Killercop.com. All Rights Reserved.