Feeds

Cyberwarriors on the Eastern Front: In the line of fire packet floods

Former senior Estonian defence official talks cyberwar

Top 5 reasons to deploy VMware with Tegile

Clueless spotters green-lit porn site for cyber carpet bombing

Just one person, an ethnic-Russian Estonian national, has been charged and convicted of the attack. Dmitri Galushkevich, 20, was fined the local equivalent of $1,200 after he was convicted of attacks against the Reform Party of Estonian Prime Minister Andrus Ansip.

"He was not accountable as an organiser but a schoolboy providing targets via chat forums," Almann explained, adding in some instances the attackers were misdirected by their spotters on the ground.

One wave of attacks, for example, took out an adult entertainment (porn) website instead of an Estonian state security site.

Estonia's analysis of the attacks reveals that small-scale ping attacks, used to carry out reconnaissance of targets, preceded the main assaults, which came in phases. "The main phase of the attack involved voluntary political botnets, predominately located in Russia, which Almann described as "easy to block", as well as assaults of growing sophistication from compromised machines around the world.

The attacks against Estonia, the first of their kind on a country-wide level, have been studied intensively by military planners since. In 2008, cyberattacks on Georgian websites and communication facilities accompanied a ground war between Russia and Georgia.

Estonia, along with Poland, stepped in to offer backup hosting of Georgian government website. Almann argues this process needs to be more organised. "We need pan-European backup hosting for critical websites," he said.

Rules of engagement

Almann reckons that rules for the investigation of cyberattacks need to be established by more countries signing up to the Council of Europe Convention on Cybercrime. Russia and China and several other key countries have not signed the treaty while some countries in Europe, including the UK, have signed but not ratified the regulations.

Russia might be encouraged to sign the treaty by making it a condition of World Trade Organisation negotiations, he suggested, adding the issue of cyberconflict ought to be on the agenda of G8 talks that include Russia and the world's seven biggest economies.

Some observers have suggested that a Geneva Convention for cyberwar might be needed, an idea Almann regards as a non-starter even though he's equally adamant that cyberwar is all too real.

"With applications such as Stuxnet attacks are growing more sophisticated," Almann said. "There are really serious capabilities out there."

"However banning the use of cyberweapons is not realistic. Cyberwar is out there and everybody is involved."

Offence is the best form of attack

Plenty of governments talk about boosting the capability of their cyber-defences but very few, at least publicly, talk about cyber-offensive capabilities. Cyber-offensive capabilities might involve attacking a particular botnet of compromised PCs or disrupting the communication channels an enemy is using to co-ordinate attacks. Almann reckons most countries are developing cyber-offensive capabilities. "Sovereign nations need the capability. It's unavoidable," he said.

However establishing rules to govern the use of such weapons is something else, in Almann's opinion.

"A Geneva Convention for cyberwar is not going to work," he said. "I'm a lawyer and I wouldn't know what to write. The field is so fast-developing that you are going to get it wrong.

"This is not burning issue and shouldn't divert attention from dealing with shortcomings of critical national infrastructure systems," he added.

Beginner's guide to SSL certificates

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.