Feeds

Spooks foils fictional Russian plot

But not entirely far-fetched

Next gen security for virtualised datacentres

UK Security Services yesterday breathed a sigh of relief at their last-minute foiling of a "distributed denial of service" (DDoS) attack on the UK by elements of the Russian Security Services.

The attack was due to be launched at 4pm GMT, when a Russian submarine tapped into a transatlantic cable – just off the shore of Cornwall – and prepared to upload a virus onto the UK internet. The virus would have propagated itself to thousands of websites within the UK – and then taken them down key elements of the national network by over-loading them with requests for data.

MI5 retaliated by dropping a "zero day" virus onto the attacker’s operating systems and taking out the submarine. This was the most complex part of the operation, with a window of just half a minute between the Russians tapping into the phone system – and going live with their attack.

OK. So this was just a plot from this week's "Spooks" (episode 2). But in the interests of broadcasting accuracy, the Reg thought we’d give it the once-over.

First, the premise underlying the attack is not so far-fetched. Back in 2007, Estonia found itself under attack, and reports suggest that significant parts of their economic infrastructure, from banks through to government websites, were either taken down or placed under severe pressure.

On a smaller scale, there has recently been a spate of DDoS attacks on websites deemed to be run by or favourable to al-Qaeda. In the case of Estonia, the finger of suspicion has been pointed at Russia – although no official conclusion has ever been reached. NATO are sufficiently worried about the threat to have studied the incident in depth.

When it comes to al-Qaeda, the jury is out as to whether this is the work of US Security Services – or freelance hackers.

The degree of damage that could be done to a country is also up for debate. Unless the DDoS attack could be moved off the web and on to the operating systems of serious infrastructure (such as power stations) the apocalyptic scenarios envisaged by Spooks just could not happen. Mind you, our government’s enthusiasm for linking up systems and e-government, together with their atrocious record on security, means that maybe the worst case scenario is not as unthinkable as we’d like.

"Nul points" for the submarine, which was one of the night’s dumber plot devices. As our in-house expert said: "They'd have a hard time putting a sub on top of a cable covertly - normally a sub which has stayed down for a while only has a sketchy idea of where it is, and similarly the cables aren't accurately mapped or easy for a naval sub to detect. And why bother? It's not as though there's some Great Firewall of the UK located offshore somewhere."

In fact they could probably do just as much damage launching the programme from an internet café in Ealing.

We also wondered whether the Russians would really be so stupid as to mount their attack from the same computer system as the rest of their boat’s operating systems.

As for MI5’s other solutions? A "zero day" virus sounds, um, spooky – but is nothing more than a previously unknown virus for which specific anti-viral software signatures are not yet available. We don’t doubt that the government has a fair few of those secreted away somewhere on its computers.

Halfway through the plot, lead spook, Harry Pearce, toddles off to the Joint Intelligence Committee to ask if the government would agree to take down the internet for a while.

Is any of this remotely possible? A spokesperson for the Home Office told us: "The vulnerabilities exploited by these attackers do not read across to UK networks but lessons were learned about how other countries including the UK may collaborate to help others under attack."

They also confirmed that in extreme circumstances, it would be possible for the UK government to close down the internet. Plans to do just this have been put in place by the Centre for the Protection of National Infrastructure, whose remit includes "reducing the vulnerability of the national infrastructure to terrorism and other threats" and "keeping the UK's essential services (delivered by the communications, emergency services, energy, finance, food, government, health, transport and water sectors) safer".

So two out of three to the makers of "Spooks" – but maybe next time, no submarines. ®

Next gen security for virtualised datacentres

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.