- WikiLeaks is âunstoppableâ
- Cyber-activism on the increase, but cyber-war is an âexaggerated termâ
Global IT vendor Panda Security reports that cyber-activism and cyber-warfare will continue to be major topics in IT security this year.
The 3rd Security Blogger Summit, recently hosted by Panda in Madrid, focused on cyber-activism and cyber-war as well as on the new dangers posed to users and institutions on the Internet. The roundtable discussion highlighted the most recent examples of these emerging trends, international cooperation and the limits of these activities on the Web. The discussion also centered on the new trends for 2011 and the legal framework against this type of Web activity.
Opinions about cyber-activism and WikiLeaks proved relatively united, with most of the participants agreeing that it is an unstoppable phenomenon. âThere is no way to stop a phenomenon like WikiLeaksâ, said Enrique Dans, panel member. âIn the future anybody will be able to disclose relevant information from a website, as contaminated as this might be.â
Bob McMillan, a San Francisco-based computer security journalist explained that, in his opinion, âWikiLeaks is as important as The New York Times. Itâs has helped those who wanted to expose sensible information, and to think of changing the legislation in the wake of a denial of service attack like those in the operation âAvenge Assangeâ is very difficultâ. Operation âAvenge Assangeâ was initiated by the Anonymous group and Operation Payback, targeting firstly organizations trying to close the net on Internet piracy, and later in support of Julian Assange, editor-in-chief of WikiLeaks.
Cyber-activism was discussed as a growing occurrence. Participants agreed that the technical evolution means people are able to replace meetings and gatherings with internet-based tools. Furthermore, the global situation that the technical evolution has created means that cyber-activism is possible on an international scale, with it becoming more and more unnecessary to gather large amounts of people in order to attract attention. IT researcher RubĂ©n Santamarta indicated that, âCyber-activism was born from the global situation we live in. Even users with limited technical know-how can join in the distributed denial of service attacks (DDoS) or spam campaigns.â
Despite hasty attempts in many countries to pass legislation to counter this type of activity, effectively by criminalizing it, Panda believes that in 2011 there will be yet more cyber-protests, organized by this group or others that will begin to emerge.
Cyber-war: Reality versus sensationalism
The Summit participants also discussed some of the most relevant examples of cyber-war, such as the alleged attacks targeting Iranâs nuclear plants using the Stuxnet Trojan, as well as Operation Aurora, concerning attacks on Google from China in order to steal secret corporate information.
Panel members Elinor Mills and Bob McMillan coincided in pointing out that the term âcyber-warâ was âtoo exaggeratedâ for the actual events taking place. âWe still do not know the real dimensions of cyber-war and it is easy to confuse it with espionage or even cyber-crimeâ, explained Elinor Mills. Bob McMillan added that, âEven though Stuxnet has been used as a cyber-weapon, it does not mean that we are already knee deep in a cyber-war. If there really was a cyber-war, it would be on a global scale, as with the two Great Wars of the 20th century.â
However, others insisted on the idea that the cyber-war phenomenon is at its early stages and will probably become a reality in 10 yearsâ time. âWe are talking about a war without an army. It is a fourth-generation war where it is possible to damage a country without having to invade it with soldierâ, says Santamarta. âA country can have another one under control through the Internet even before they have declared war on each otherâ, he concludes.
While the debate over cyber-war and its effects continue, Panda believes that these kinds of web attacks will increase in 2011, with many of them remaining unnoticed by the general public.
More information about the 3rd Security Blogger Summit is available at www.securitybloggersummit.com.
For more information about Panda, visit http://www.pandasecurity.com/.