Academia.eduAcademia.edu

Outline

13 Power over Information Flow

2011, The Global Flow of Information

https://doi.org/10.18574/NYU/9780814748114.003.0013

Abstract

Information flows through a global environment characterized by conflict and competition. one party wants a flow to occur; another wants to block it. To illustrate: Users want to freely exchange information, while governments and businesses seek to block information harmful to their interests. Spies try to infiltrate the networks of their adversaries and competitors to gather intelligence, while their targets employ security mechanisms to prevent network exploitation and attack. hackers and identity thieves send e-mails loaded with viruses and other forms of malicious software, while users employ antiviral tools to block the same. conflicts over information flow are at the heart of information operations and warfare, to include cyberwarfare, cybercrime, and cyber conflict in general. one party sends packets or streams of information that aim to attack, exploit, or influence a target, while the opponent employs measures to stop the flows. The cyber assault against estonia in 2007, for example, was launched by patriotic Russian hackers who were incensed by the relocation of a Soviet-era war memorial in estonia's capital, Tallinn. To express their outrage, they flooded select estonian web sites with internet packets, exploiting at least one "botnet" of compromised computers to create a massive amount of traffic. Their distributed denialof-service (ddoS) attack shut down the sites until the estonians could effectively block the traffic and the hackers backed off. Russian hackers launched similar attacks against georgian web sites in 2008, this time in