Wednesday, February 16, 2011

Social Networking and Egypt's Freedom ~

     Social Networking has become more important than anyone could have ever imagined.  When it first came about many people didn't give it much weight. The impact that this type of communication has had on political change carries a lot of weight.  Egypt would have never been able to organize the protest that led to the freedom of the country without it.  This was mostly orchestrated by the young people of this country, using social networking.  Without them and the communication methods available, none of this would have ever happened.  Who knew the important role that the smart phone would take?  Without social networking the protests going on in the middle east would have never come about.  Communication and modern technology have provided a vehicle for political change.  There is a peaceful way to wage a revolution, well almost.  Not to discount the ones who lost their lives or suffered injuries, but they are a lot less than that of a traditional war. 


     It makes one wonder which country will revolt against their government next.  Many speculate that it will be Iran, but Jordan comes to mind as well.  Yemen was not on my mind at the time of this post, so additional information to make things current is in order.


     April 5, 2011 update:  Moammar Gadhafi is refusing to step down as Hoseni Mobarak did, and at present is fighting against those opposed to him.  Many are against the killing of civilians and the torture of those that disagree with his autocracy, including President Obamma.  Once again, this revolt has been given momentum by the use of social networking.  The United Nations has issued a no fly zone, to prevent the killing of civilians by the troups loyal to Gadhafi. 


     Meanwhile, protestors in Taiz,Yemen are demanding the outser of longtime ruler Ali Abdullah Saleh.  They too, are being fired upon, as yet another conflict in the middle east escalates.  Social networking is once again helping organize efforts of the protestors.  The protests are being organized with this technology and depend on its existance.


These types of protests leading to revolts seem to be sweeping the middle east.  It will be interesting to see the role that social networking plays in the attempts to overthrow the remaining dictatorships that still exist today.

Tuesday, February 15, 2011

Cyber Warfare Today

Cyber Warfare
     Cyber attacks are becoming a more prevalent type of warfare engaged in by many entities against another.  Though identifying the source of the attacks can sometimes be subjective due to the lack of technology to do so, there seems to always be a suspicion as to where the attacks came from and what the motive was.  The Russian denial-of-service attack on the country of Estonia in 2007 made headline news as an act of war.  The cyber attacks on Georgia in 2008 during their war with Russia were speculated to be Russian driven.  Lastly, when the U.S. State Department computers of the East Asia Bureau were compromised during 2006, fingers pointed to China.  “The Pentagon warned earlier this year that China’s army is emphasizing hacking as an offensive weapon.  It cited Chinese military exercises in 2005 that included hacking primarily in first strikes against enemy networks.” (Griffin, 2007).  All of these three attacks have one thing in common:  they all used the same silent weapon; cyber-terrorism.
     Estonia is touted to be one of the most connected countries in the world.  The wireless communities and government of this country were rendered helpless in a denial of service attack, due to their extreme internet dependence.  It is a way of life, completing most things via a handheld or laptop, from banking to parliamentary elections.  The attack affected state and commercial websites, most of which were run primarily online.  Foreign and defense ministries, newspapers and banks were specific targets hit.  The denial of service attack in 2007 said to be instrumented by Russia, affected ordinary citizens as well as government officials.  The rippling effect was felt by a large segment of the population and caused chaos and confusion.  “Officials have blocked access to the servers from outside Estonia, to prevent them from being attacked.”  (Lagorio, 2006).   The  attacks  were said to  begin after a Soviet  memorial  statue in  Tallin  was
removed.  The defense ministry says that some of the cyber attacks came from Russian hosted servers.  Of course, Russia is not cooperating or commenting on these events.
     The cyber-attacks during the 2008 South Ossetia war between Georgia and Russia coupled themselves with the bloody shooting battle taking place.  The Georgian government stands firmly with their accusation of Russia for disabling Websites, including the Ministry of Foreign Affairs.  This attack which encompasses massive requests for data is called a distributed denial of service attack. “These attacks appear to be controlled from a server based at a telecommunications firm.” (Markoff, 2008).  Since cyber attacks cost very little, they have taken their place in modern warfare.  Georgia was vulnerable due to its dependence on Russia and Turkey for global internet connections.  The United States is backing a fiber-optic network link under the Black Sea, due to happen in September.  Hopefully this will solve their future issues in this area.
     The computers that were compromised in the East Asia Bureau in 2006 came as a big surprise as nothing was missing.  Even though nothing was physically taken, the damage from these hacks occurred from information theft.  This large-scale intrusion that targeted the offices communicating with China and North Korea, involved the theft of sensitive U.S. information and passwords.  Officials reported that the unclassified systems were affected while the classified areas were uncompromised.  The Defense department noticed similar computer problems last summer, and considers Chinese hackers to be the culprits in that incident, as well as the above noted.  “After the State Department break-ins, many employees were instructed to change their passwords.  The department also temporarily disabled a technology known as secure sockets layer, used to transmit encrypted information over the Internet.” (Davis, 2007).  Identifying this vulnerable area will prevent hackers from transmitting stolen data, covertly from a victim’s network.  Also of note is:  “Many diplomats were unable to access their online bank accounts using government computers.” (Lagorio, 2011).  The problem is said to be fixed, but it was noted exactly how this was done.
    Since hacking is now being viewed as an offensive weapon, this type of cyber terrorism may be a permanent occurrence to be expected by all those connected globally.  “Given that most parts of the world now have access to the Internet, almost any country can fall victim to some form of cyber terrorism or information warfare.” (Taylor, 2011)  Since identifying the sources of these attacks still remains problematic, it will mostly likely grow in the near future.  Furthermore, since the Pentagon is already warning that China’s army is emphasizing hacking as an offensive weapon, the evidence of this type of warfare is proven.  Unfortunately, it appears that the silent weapon of cyber-terrorism is here to stay.
Written as Crayon Cards on February 15, 2011
          
References
Davis, J., (2007) Wired Website, Hackers take down the most wired country in europe, retrieved   February 13, 2011 from http://www.wired.com/politics/security/magazine/15-   09/ff_estonia?currentPage=all
 Griffin, J., (2007) Fox News Website (2007) Pentagon source says china hacked defense computers, retrieved February 12, 2011 from          http://www.foxnews.com/story/0,2933,295640,00.html
Lagorio, C., (2006) CBS News Website, State department computers hacked, retrieved on            February 14, 2011 from    http://www.cbsnews.com/storeis/2006/07/11/national/main1794152.shtml?CMP=ILC-      SearchStories
Markoff, J., (2009) New York Times Website, Georigia takes a beating in the cyber war with russia, retrieved February 11, 2011 from http://bits.blogs.nytimes.com/2008/08/11
Taylor R. W., Fritsch E., Liederbach J., & Holt T. (2010). Digital crime and digital terrorism  (2nd ed.) New Jersey: Prentice Hall.