Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Someone Is Learning How to Take Down the Internet
Lawfare ^ | September 13, 2016 | Bruce Schneier

Posted on 09/15/2016 4:29:48 PM PDT by 2ndDivisionVet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don't know who is doing this, but it feels like a large a large nation state. China and Russia would be my first guesses.

First, a little background. If you want to take a network off the Internet, the easiest way to do it is with a distributed denial-of-service attack (DDoS). Like the name says, this is an attack designed to prevent legitimate users from getting to the site. There are subtleties, but basically it means blasting so much data at the site that it's overwhelmed. These attacks are not new: hackers do this to sites they don't like, and criminals have done it as a method of extortion. There is an entire industry, with an arsenal of technologies, devoted to DDoS defense. But largely it's a matter of bandwidth. If the attacker has a bigger fire hose of data than the defender has, the attacker wins.

Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they're used to seeing. They last longer. They're more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure.

The attacks are also configured in such a way as to see what the company's total defenses are. There are many different ways to launch a DDoS attacks. The more attack vectors you employ simultaneously, the more different defenses the defender has to counter with. These companies are seeing more attacks using three or four different vectors. This means that the companies have to use everything they've got to defend themselves. They can't hold anything back. They're forced to demonstrate their defense capabilities for the attacker.

I am unable to give details, because these companies spoke with me under condition of anonymity. But this all is consistent with what Verisign is reporting. Verisign is the registrar for many popular top-level Internet domains, like .com and .net. If it goes down, there's a global blackout of all websites and e-mail addresses in the most common top-level domains. Every quarter, Verisign publishes a DDoS trends report. While its publication doesn't have the level of detail I heard from the companies I spoke with, the trends are the same: "in Q2 2016, attacks continued to become more frequent, persistent, and complex."

There's more. One company told me about a variety of probing attacks in addition to the DDoS attacks: testing the ability to manipulate Internet addresses and routes, seeing how long it takes the defenders to respond, and so on. Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services.

Who would do this? It doesn't seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It's not normal for companies to do that. Furthermore, the size and scale of these probes—and especially their persistence—points to state actors. It feels like a nation's military cybercommand trying to calibrate its weaponry in the case of cyberwar. It reminds me of the U.S.'s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.

What can we do about this? Nothing, really. We don't know where the attacks come from. The data I see suggests China, an assessment shared by the people I spoke with. On the other hand, it's possible to disguise the country of origin for these sorts of attacks. The NSA, which has more surveillance in the Internet backbone than everyone else combined, probably has a better idea, but unless the U.S. decides to make an international incident over this, we won't see any attribution.

But this is happening. And people should know.


TOPICS: Business/Economy; Computers/Internet; Conspiracy; Government
KEYWORDS: internet
Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 09/15/2016 4:29:48 PM PDT by 2ndDivisionVet
[ Post Reply | Private Reply | View Replies]

To: 2ndDivisionVet
Demonicrat October surprise.
2 posted on 09/15/2016 4:33:30 PM PDT by mountainlion (Live well for those that did not make it back.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Act of war...


3 posted on 09/15/2016 4:38:19 PM PDT by Axenolith (Government blows, and that which governs least, blows least...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Bkmrk.


4 posted on 09/15/2016 4:40:53 PM PDT by RushIsMyTeddyBear (<<<<< he no longer IS my 'teddy bear'.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Don’t forget the successful attack against the Metcalf Substation in San Jose back on 16 April 2013. A team of snipers did $15 mil worth of damage and got away clean, despite the offer of a substantial reward for information.

In addition to taking out a major electrical substation, they also cut three fiber optic data cables.


5 posted on 09/15/2016 4:41:46 PM PDT by Steely Tom (Vote GOP: A Slower Handbasket)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet
It's tough to really do anything about this now while the US controls the Internet.

It will be impossible to do anything at all once Obama transfers the Internet to foreign powers.

These probing cyber warfare attacks seem to coincide with our current Obama Administration plan and time line to give away of the Internet

Coincidence?

Be serious.

6 posted on 09/15/2016 4:43:17 PM PDT by rdcbn ("There is no means of avoiding a final collapse of a boom brought about by credit expansion. The alt)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mountainlion

NSA or DHS by order of 0dunga.


7 posted on 09/15/2016 4:45:53 PM PDT by CivilWarBrewing (Females DESTROYED America.)
[ Post Reply | Private Reply | To 2 | View Replies]

They want to take out the cloud providers. With even small attacks they can
Bring down the cloud.


8 posted on 09/15/2016 4:49:07 PM PDT by jonose
[ Post Reply | Private Reply | To 6 | View Replies]

To: 2ndDivisionVet

All the more reason to elect a government we can trust. democrat islam ain’t it.


9 posted on 09/15/2016 4:51:52 PM PDT by soycd
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet
Verisign is the registrar for many popular top-level Internet domains, like .com and .net. If it goes down, there's a global blackout of all websites and e-mail addresses in the most common top-level domains.

It's not that they are a domain registrar, as domain lookups are cached all over the internet. The critical issue is the soon to be "forced" move from http to https by browsers. If you can't obtain a certificate, you can't view the website.

10 posted on 09/15/2016 4:56:27 PM PDT by Rightwing Conspiratr1
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

IBM gave away PC business to Chinese Lenovo. Now they can produce and sell us computers with built in back door for remote control of US. Brilliant!


11 posted on 09/15/2016 5:05:37 PM PDT by Leo Carpathian (FReeeeepeesssssed)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

If true, we at Freerepublic need to develop an alternative communication plan. I will go crazy without Freerepublic.


12 posted on 09/15/2016 5:19:25 PM PDT by No Socialist
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

On their secret island base in the Pacific, all the losers of the 90s Internet boom — Netscape, MySpace, Napster, Pets.com, Lycos, AltaVista, Kozmo, Flooz, GeoCities, EToys, Beenz, WebVan, Go.com — are planning their revenge.


13 posted on 09/15/2016 5:26:53 PM PDT by x
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Airline networks too.


14 posted on 09/15/2016 5:27:59 PM PDT by jacknhoo (Luke 12:51. Think ye, that I am come to give peace on earth? I tell you, no; but separation.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: No Socialist

15 posted on 09/15/2016 5:35:43 PM PDT by 2ndDivisionVet (You cannot invade the mainland US. There'd be a rifle behind every blade of grass.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: 2ndDivisionVet

That’s a 10-4, good buddy!


16 posted on 09/15/2016 5:37:30 PM PDT by Larry Lucido
[ Post Reply | Private Reply | To 15 | View Replies]

To: No Socialist

A dial up private network. Dig out the old 56k modems.


17 posted on 09/15/2016 6:54:11 PM PDT by enduserindy (Republican's have sold the path, not lost it.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: 2ndDivisionVet

You’ll love this site:

http://www.radioshackcatalogs.com


18 posted on 09/15/2016 10:30:10 PM PDT by mkleesma (`Call to me, and I will answer you and tell you great and unsearchable things you do not know.')
[ Post Reply | Private Reply | To 15 | View Replies]

To: enduserindy

On the contrary - move all websites off ipv4 and on to ipv6...there are literally a quadrillion addresses...simply buy a range of a few million, and when an attack happens, dynamically move it to another.


19 posted on 09/15/2016 10:33:25 PM PDT by mkleesma (`Call to me, and I will answer you and tell you great and unsearchable things you do not know.')
[ Post Reply | Private Reply | To 17 | View Replies]

To: 2ndDivisionVet; Arthur Wildfire! March; Jim Robinson

An unknown government is testing the defenses of Verisign et. al. in order to find a way to take down the internet altogether. All our internet belongs to us?


20 posted on 09/16/2016 11:22:39 AM PDT by The Westerner (When Speech is no longer Free, neither will we be.)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson