{"id":788,"date":"2007-05-30T15:54:16","date_gmt":"2007-05-30T23:54:16","guid":{"rendered":"\/?p=788"},"modified":"2007-05-30T15:58:41","modified_gmt":"2007-05-30T23:58:41","slug":"denial-mobs-the-cyberwar-on-estonia","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=788","title":{"rendered":"Denial mobs &#038; the Cyberwar on Estonia"},"content":{"rendered":"<p><a href=\"http:\/\/ross.typepad.com\/blog\/2007\/05\/denial_mobs_the.html\" class=\"broken_link\">Ross Mayfield<\/a> of <a href=\"http:\/\/www.socialtext.com\/\">Socialtext <\/a>writes more explicitly about the same possible social-technical phenomena I hinted at in <a href=\"\/?p=785\">my recent piece <\/a>on Cyber-attack against Estonia:<\/p>\n<blockquote><p>The latest thread of the Cyberwar attack against Estonia, as covered in the <a href=\"http:\/\/www.nytimes.com\/2007\/05\/29\/technology\/29estonia.html?ex=1338091200&amp;en=80d1358e48b6740b&amp;ei=5088&amp;partner=rssnyt&amp;emc=rss\" class=\"broken_link\">NY Times<\/a>, an <a href=\"http:\/\/news.com.com\/2008-7349_3-6186751.html\" class=\"broken_link\">interview in Cnet<\/a> with an expert from Arbor Networks and a post <a href=\"\/?p=785\">Kim Cameron<\/a> raise an interesting question.&nbsp; It is unlikely that the Russian government can be directly linked to the massive coordinated and sophisticated denial of service attack on Estonia. It is also possible that such attack could self-organize with the right conditions.&nbsp; Is a large part of our future dealing with hacktavists as denial mobs?<\/p>\n<p>Given the right conditions that make a central resource a target, a decentralized attack could be decentralized in its coordination as well.&nbsp; Estonia may be the first nation state to be attacked at the scale of war, but it isn&#39;t just nations at threat.&nbsp; The largest bank in Estonia, in one of the top markets for e-banking, has losses in excess of $1M.&nbsp; Small amount relatively, but the overall economic cost is far from known.<\/p>\n<p>If a multinational corporation did something to spark widespread outrage, such an attack could emerge against it as a net-dependent institution.&nbsp; Then we would be asking ourselves if the attack was economic warfare from a nation or terrorist organization.&nbsp; But it also could be a lesser, and illegal, form of grassroots activism.&nbsp; None of this is particularly new, but less in concept.<\/p>\n<p>But what is new are tools, that cut both ways, for easy group forming and conversation.&nbsp;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Ross Mayfield asks if it is possible that a cyber-attack could self-organize with the right conditions&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,13],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/788"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=788"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/788\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}