Websites that publish controversial material are facing a barrage of politically-motivated computer attacks, say Harvard University researchers.
The researchers, who launched the survey after hearing complaints from website owners, identified almost 300 attempts to silence independent media and human rights websites over the past year.
The researchers, who launched the survey after hearing complaints from website owners, identified almost 300 attempts to silence independent media and human rights websites over the past year.
"There is almost always a political component to these attacks," says Jillian York, one of the report's authors.
The researchers focused on distributed denial of service (DDoS) attacks, the technique that temporarily downed the Wikileaks website last month. DDoS attackers aim a flood of signals at a target website until the site, or the network that connects it to the internet, collapses under the strain of the incoming data.
Hundreds of attacks
The Wikileaks attacks were described at the time as a new and dangerous attempt to limit free speech. They are anything but new, according to the report. York and colleagues identified 140 attacks aimed at 280 media and human rights sites over the 12-month period ending in August of this year. They also surveyed the administrators of 45 media and human rights sites; 28 said they had been the target of a DDoS attack in the past year.
Targets include the protest site bauxitevietnam.info, which campaigns against a Chinese-backed project to mine bauxite in an environmentally sensitive part of Vietnam. It went down last January after tens of thousands of Vietnamese computer users were fooled into downloading software that aimed a flood of signals at the site.
Large scale problem
The Harvard team itself has been the victim of an attack. Their server also hosts the site of the Citizen Media Law Project, which supports online and citizen media. The site went down for two hours and remained unstable for a day at the end of August after being targeted by a network of 500 computers, says Hal Roberts, who also worked on the report. As with almost all other DDoS incidents, it is impossible to know who coordinated the attack.
The fact that attackers were able to force the law site offline illustrates the scale of the problem, adds Roberts. The site's server is overseen by two skilled administrators. For less well resourced sites, some of which are set up by volunteers using free-to-use software, the downtime can run to day or weeks. He and York suggest that media and human rights organisations run mirror sites at large blogging platforms, such as Blogger, which can withstand the traffic generated by most DDoS attacks.
Weapon or protest tool?
The Wikileaks attacks brought DDoS to the attention of the public, but security experts have long been aware of the problem. Gunter Ollmann of Damballa, a computer security firm based in Atlanta, Georgia, has blogged extensively on DDoS attacks and notes that as well as being used to silence critics, they are often used as a form of protest. Some commentators have described the attacks on PayPal and Mastercard, which took place after the companies severed links with Wikileaks, as virtual "sit-ins".
"DDoS tools and tactics are unfortunately a very common tactic, whether someone is trying to knock off the opposition within an online game, such as World of Warcraft, or extorting money from gambling sites in the lead up to a major sporting event," he says.