Skip to main content
Part of complete coverage from

The cyberwar may be headed to your computer

By Douglas Rushkoff, Special to CNN
updated 10:05 AM EDT, Mon June 4, 2012
Much of the Flame virus code is simply camouflage -- 3,000 lines of programming that make it hard to understand.
Much of the Flame virus code is simply camouflage -- 3,000 lines of programming that make it hard to understand.
STORY HIGHLIGHTS
  • Douglas Rushkoff: Flame virus attack on Iran has hallmarks of being concocted by nation-state
  • He cites article saying Obama concerned that such an attack might someday be aimed at U.S.
  • He asks: What's to keep malware from being aimed at civilian populations?
  • Rushkoff: We are headed toward an Internet that's blocked by airport-style security checks

Editor's note: Douglas Rushkoff writes a regular column for CNN.com. He is a media theorist and the author of "Program or Be Programmed: Ten Commands for a Digital Age" and "Life Inc: How Corporatism Conquered the World and How We Can Take It Back."

(CNN) -- The recently discovered Flame virus bears all the hallmarks of a cyberattack concocted by a nation-state. It's big and complex and pointed directly at a geopolitical hot zone, Iran.

What really gives it away as a government project is the extent to which its programmers sought to keep it out of civilian hands. The malware seems no more designed to protect us from a nuclear Iran than it is safeguarded to keep us from using the program itself against one another.

Flame is sophisticated. It's not a tiny piece of code that nests itself in e-mail and then erases your hard drive. It might better be described as a suite of programs -- the Microsoft Office of malware -- that perform different tasks.

One turns on the microphone of a computer to record conversations; another sets up a virtual machine on the computer to be controlled remotely; another uses Bluetooth to connect to nearby cell phones and copy data or monitor phone calls. One compresses all this espionage into smaller files; yet another sends data back to the master computer, accepts commands and installs new updates. This level of complexity and breadth of functionality is unparalleled.

Douglas Rushkoff
Douglas Rushkoff

But, in the theater of cyberwarfare, every successful cyberattack can be considered the most advanced attack of all time. This is an arms race of a new sort, where measures and countermeasures change the entire programming landscape. The methods of previous attacks, once analyzed, are neutralized by new additions and patches to computer operating systems. This sends would-be infiltrators back to the drawing board to come up with new, superior approaches. Technological warfare is a bit like evolution, where new mutations compete for survival.

Only on computers, we don't have to wait for nature to spontaneously fold a chromosome in some new way. We have programmers actively looking for new windows of opportunity, new maneuvers, new countermeasures and new ways of hiding what they're doing.

Cyber-sleuths track Flame malware
New computer virus discovered
New espionage 'malware' discovered

It amounts to the weaponization of cyberspace -- a practice in which the U.S. government has apparently been participating, sometimes reluctantly, according to an article in The New York Times last week. The cybercampaign against Iran apparently began under the Bush administration working with Israel, and continued under Barack Obama, who voiced concern about the precedent America was setting.

The resulting Stuxnet virus, aimed at disabling Iran's nuclear refineries, ended up getting loose on the Internet in the summer of 2010. The revelation of U.S. involvement with the virus worried Obama, according to the Times article, as it could justify future cyberattacks on Americans by enemies of the United States.

Flame may or may not be another product of this same campaign.

When asked about his nation's complicity in the malware, Israeli Vice Prime Minister Moshe Ya'alon cheekily told Army Radio, "Israel is blessed with high technology." But the rest of us are blessed with high technology, too.

What's to keep malware such as Flame from being used against civilian populations or even by civilian populations?

Nations have been using computers for warfare since computers existed. The development of the modern computer was in no small part accelerated by World War II. America's ENIAC computer calculated artillery trajectories, while Britain's Colossus computer decoded the Nazi's encrypted messages. At the time, however, computers were not household appliances. Like cannons and other weapons of war, they were tools of the state and inaccessible to regular folks.

And while the current cyberwar may be a nation vs. nation affair, the kinds of technologies unleashed in this conflict are not beyond the technical capability of more rogue hackers and criminals. The same technologies that let the U.S. and Israel thwart Iran's nuclear program can also enable, say, an Eastern European crime syndicate to participate in your banking activity.

What makes Flame unique -- and almost certainly of government origin -- is that it appears to have been written in a way that not only slows detection and countermeasures, but that also slows the spread of its techniques. The complete suite of programs is over 20 megabytes.

And while at first glance this seems to be a downside -- an elephant hiding in plain sight -- it has actually served to keep it unnoticed for at least two years. More importantly, it was made huge on purpose. Much of its code is simply camouflage -- 3,000 lines of programming that make it hard to understand and even harder for an enemy team of coders or even hackers in the civilian population to copy and use themselves.

It's as if its programmers were attempting to be responsible or at least exclusionary, and to prevent the weaponization of the greater Internet. Now that's classic government behavior. It's also probably futile.

Such efforts will likely only slow this inevitable slide toward an Internet that feels as blocked by security checks as an international airport. For in truth, we are all blessed with high technology.

Follow us on Twitter @CNNOpinion

Join us on Facebook/CNNOpinion

The opinions expressed in this commentary are solely those of Douglas Rushkoff.

ADVERTISEMENT
Part of complete coverage on
updated 5:22 AM EST, Fri December 19, 2014
President Obama has been flexing his executive muscles lately despite Democrat's losses, writes Gloria Borger
updated 2:51 PM EST, Thu December 18, 2014
Jeff Yang says the film industry's surrender will have lasting implications.
updated 4:13 PM EST, Thu December 18, 2014
Newt Gingrich: No one should underestimate the historic importance of the collapse of American defenses in the Sony Pictures attack.
updated 7:55 AM EST, Wed December 10, 2014
Dean Obeidallah asks how the genuine Stephen Colbert will do, compared to "Stephen Colbert"
updated 12:34 PM EST, Thu December 18, 2014
Some GOP politicians want drug tests for welfare recipients; Eric Liu says bailed-out execs should get equal treatment
updated 8:42 AM EST, Thu December 18, 2014
Louis Perez: Obama introduced a long-absent element of lucidity into U.S. policy on Cuba.
updated 12:40 PM EST, Tue December 16, 2014
The slaughter of more than 130 children by the Pakistani Taliban may prove as pivotal to Pakistan's security policy as the 9/11 attacks were for the U.S., says Peter Bergen.
updated 11:00 AM EST, Wed December 17, 2014
The Internet is an online extension of our own neighborhoods. It's time for us to take their protection just as seriously, says Arun Vishwanath.
updated 4:54 PM EST, Tue December 16, 2014
Gayle Lemmon says we must speak out for the right of children to education -- and peace
updated 5:23 AM EST, Wed December 17, 2014
Russia's economic woes just seem to be getting worse. How will President Vladimir Putin respond? Frida Ghitis gives her take.
updated 1:39 AM EST, Wed December 17, 2014
Australia has generally seen itself as detached from the threat of terrorism. The hostage incident this week may change that, writes Max Barry.
updated 3:20 PM EST, Fri December 12, 2014
Thomas Maier says the trove of letters the Kennedy family has tried to guard from public view gives insight into the Kennedy legacy and the history of era.
updated 9:56 AM EST, Mon December 15, 2014
Will Congress reform the CIA? It's probably best not to expect much from Washington. This is not the 1970s, and the chances for substantive reform are not good.
updated 4:01 PM EST, Mon December 15, 2014
From superstorms to droughts, not a week goes by without a major disruption somewhere in the U.S. But with the right planning, natural disasters don't have to be devastating.
updated 9:53 AM EST, Mon December 15, 2014
Would you rather be sexy or smart? Carol Costello says she hates this dumb question.
updated 5:53 PM EST, Sun December 14, 2014
A story about Pope Francis allegedly saying animals can go to heaven went viral late last week. The problem is that it wasn't true. Heidi Schlumpf looks at the discussion.
updated 10:50 AM EST, Sun December 14, 2014
Democratic leaders should wake up to the reality that the party's path to electoral power runs through the streets, where part of the party's base has been marching for months, says Errol Louis
updated 4:23 PM EST, Sat December 13, 2014
David Gergen: John Brennan deserves a national salute for his efforts to put the report about the CIA in perspective
updated 9:26 AM EST, Fri December 12, 2014
Anwar Sanders says that in some ways, cops and protesters are on the same side
updated 9:39 AM EST, Thu December 11, 2014
A view by Samir Naji, a Yemeni who was accused of serving in Osama bin Laden's security detail and imprisoned for nearly 13 years without charge in Guantanamo Bay
updated 12:38 PM EST, Sun December 14, 2014
S.E. Cupp asks: How much reality do you really want in your escapist TV fare?
updated 1:28 PM EST, Thu December 11, 2014
Rip Rapson says the city's 'Grand Bargain' saved pensions and a world class art collection by pulling varied stakeholders together, setting civic priorities and thinking outside the box
updated 6:10 PM EST, Sat December 13, 2014
Glenn Schwartz says the airing of the company's embarrassing emails might wake us up to the usefulness of talking in-person instead of electronically
updated 5:33 PM EST, Fri December 12, 2014
The computer glitch that disrupted air traffic over the U.K. on Friday was a nuisance, but not dangerous, says Les Abend
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT