Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Someone Is Learning How to Take Down the Internet
Lawfare ^ | September 13, 2016 | Bruce Schneier

Posted on 09/15/2016 4:29:48 PM PDT by 2ndDivisionVet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don't know who is doing this, but it feels like a large a large nation state. China and Russia would be my first guesses.

First, a little background. If you want to take a network off the Internet, the easiest way to do it is with a distributed denial-of-service attack (DDoS). Like the name says, this is an attack designed to prevent legitimate users from getting to the site. There are subtleties, but basically it means blasting so much data at the site that it's overwhelmed. These attacks are not new: hackers do this to sites they don't like, and criminals have done it as a method of extortion. There is an entire industry, with an arsenal of technologies, devoted to DDoS defense. But largely it's a matter of bandwidth. If the attacker has a bigger fire hose of data than the defender has, the attacker wins.

Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they're used to seeing. They last longer. They're more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure.

The attacks are also configured in such a way as to see what the company's total defenses are. There are many different ways to launch a DDoS attacks. The more attack vectors you employ simultaneously, the more different defenses the defender has to counter with. These companies are seeing more attacks using three or four different vectors. This means that the companies have to use everything they've got to defend themselves. They can't hold anything back. They're forced to demonstrate their defense capabilities for the attacker.

I am unable to give details, because these companies spoke with me under condition of anonymity. But this all is consistent with what Verisign is reporting. Verisign is the registrar for many popular top-level Internet domains, like .com and .net. If it goes down, there's a global blackout of all websites and e-mail addresses in the most common top-level domains. Every quarter, Verisign publishes a DDoS trends report. While its publication doesn't have the level of detail I heard from the companies I spoke with, the trends are the same: "in Q2 2016, attacks continued to become more frequent, persistent, and complex."

There's more. One company told me about a variety of probing attacks in addition to the DDoS attacks: testing the ability to manipulate Internet addresses and routes, seeing how long it takes the defenders to respond, and so on. Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services.

Who would do this? It doesn't seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It's not normal for companies to do that. Furthermore, the size and scale of these probes—and especially their persistence—points to state actors. It feels like a nation's military cybercommand trying to calibrate its weaponry in the case of cyberwar. It reminds me of the U.S.'s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.

What can we do about this? Nothing, really. We don't know where the attacks come from. The data I see suggests China, an assessment shared by the people I spoke with. On the other hand, it's possible to disguise the country of origin for these sorts of attacks. The NSA, which has more surveillance in the Internet backbone than everyone else combined, probably has a better idea, but unless the U.S. decides to make an international incident over this, we won't see any attribution.

But this is happening. And people should know.


TOPICS: Business/Economy; Computers/Internet; Conspiracy; Government
KEYWORDS: internet
Navigation: use the links below to view more comments.
first previous 1-2021-24 last
To: 2ndDivisionVet

[ICANN] The Internet Giveaway a Bunker Hill Issue
http://www.freerepublic.com/focus/chat/3470386/posts

[Even if we lose, make them PAY!]


21 posted on 09/17/2016 9:24:47 AM PDT by Arthur Wildfire! March (Obama's High Crime: giving away Internet on Sept 30. Please check profile.)
[ Post Reply | Private Reply | To 1 | View Replies]

Basics for Understanding Obama’s Internet Giveaway
http://www.freerepublic.com/focus/f-chat/3464721/posts
— and listing/linking the senators and news sources sounding the horn.

~~~

ICANN Transition Even Endangers ‘.gov’ and ‘.mil’
http://www.freerepublic.com/focus/f-news/3469586/posts

http://www.judiciary.senate.gov/download/09-14-16-rosenzweig-testimony.

ICANN transition insider Paul Rosenweig warns:

1. Foreign powers will “indisputably have increased influence”.
2. Transition a “leap in the dark”.
3. ICANN planning to move overseas.
4. ‘.gov’ and ‘.mil’ “not assured by any enforeable mechanism”.

~~~

Europe is seeking to form of ‘internet ostracism’ to regulate all domain names [aka web addresses] throughout the world, and Obama is on board.

Research here including followup posts ...
http://www.freerepublic.com/focus/news/3394704/posts

~~~

Senator Grassley in ICANN Hearing [internet giveaway]
http://www.freerepublic.com/focus/news/3469467/posts

— “Unconstitutional”
— His concerns concur with Paul Rosenweig’s

~~~

Open Letter of Concern by Senators Cruz, Lankford, and Lee
http://www.freerepublic.com/focus/chat/3463938/posts?page=113#113
[ICANN is stalling on specifics and holding secret talks with China.]

Open Letter by 25 advocacy groups incl. ‘Americans for Tax Reform’
http://docs.techfreedom.org/Coalition_Letter_IANA_8.10.16.pdf

[More links coming up for deeper research]


22 posted on 09/17/2016 9:26:36 AM PDT by Arthur Wildfire! March (Obama's High Crime: giving away Internet on Sept 30. Please check profile.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: 2ndDivisionVet

Thanks to Obama’s giving control of the Internet to some UN body, I expect to see censorship by years end


23 posted on 09/18/2016 2:57:28 AM PDT by The Great RJ ("Socialists are happy until they run out of other people's money." Margaret Thatchet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

Does anyone remember when the executive branch of the U.S. government threw technological secrets open and started going hog wild in inviting mainland China and then other Third World countries to send their people here to be shown an extensive insiders’ view and details by governmental agencies across America at every level and how the U.S. at the highest level gave its technology away under the guise of kumbayah, “one world.” Middle Eastern students were welcomed to U.S. universities after big Middle Eastern studies buildings and departments were set up and paid for by Muslim countries, such as the Saudis. These students flooded computer science departments and the science of how bridges and buildings stand, and, of course, how to fly planes. Why do you think they were and are here? I have to admit I don’t know how many have come to study English literature.


24 posted on 09/18/2016 7:31:17 PM PDT by Seeing More Clearly Now
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-24 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson