Skip to main content
Part of complete coverage from

The cyberwar may be headed to your computer

By Douglas Rushkoff, Special to CNN
June 4, 2012 -- Updated 1405 GMT (2205 HKT)
Much of the Flame virus code is simply camouflage -- 3,000 lines of programming that make it hard to understand.
Much of the Flame virus code is simply camouflage -- 3,000 lines of programming that make it hard to understand.
STORY HIGHLIGHTS
  • Douglas Rushkoff: Flame virus attack on Iran has hallmarks of being concocted by nation-state
  • He cites article saying Obama concerned that such an attack might someday be aimed at U.S.
  • He asks: What's to keep malware from being aimed at civilian populations?
  • Rushkoff: We are headed toward an Internet that's blocked by airport-style security checks

Editor's note: Douglas Rushkoff writes a regular column for CNN.com. He is a media theorist and the author of "Program or Be Programmed: Ten Commands for a Digital Age" and "Life Inc: How Corporatism Conquered the World and How We Can Take It Back."

(CNN) -- The recently discovered Flame virus bears all the hallmarks of a cyberattack concocted by a nation-state. It's big and complex and pointed directly at a geopolitical hot zone, Iran.

What really gives it away as a government project is the extent to which its programmers sought to keep it out of civilian hands. The malware seems no more designed to protect us from a nuclear Iran than it is safeguarded to keep us from using the program itself against one another.

Flame is sophisticated. It's not a tiny piece of code that nests itself in e-mail and then erases your hard drive. It might better be described as a suite of programs -- the Microsoft Office of malware -- that perform different tasks.

One turns on the microphone of a computer to record conversations; another sets up a virtual machine on the computer to be controlled remotely; another uses Bluetooth to connect to nearby cell phones and copy data or monitor phone calls. One compresses all this espionage into smaller files; yet another sends data back to the master computer, accepts commands and installs new updates. This level of complexity and breadth of functionality is unparalleled.

Douglas Rushkoff
Douglas Rushkoff

But, in the theater of cyberwarfare, every successful cyberattack can be considered the most advanced attack of all time. This is an arms race of a new sort, where measures and countermeasures change the entire programming landscape. The methods of previous attacks, once analyzed, are neutralized by new additions and patches to computer operating systems. This sends would-be infiltrators back to the drawing board to come up with new, superior approaches. Technological warfare is a bit like evolution, where new mutations compete for survival.

Only on computers, we don't have to wait for nature to spontaneously fold a chromosome in some new way. We have programmers actively looking for new windows of opportunity, new maneuvers, new countermeasures and new ways of hiding what they're doing.

Cyber-sleuths track Flame malware
New computer virus discovered
New espionage 'malware' discovered

It amounts to the weaponization of cyberspace -- a practice in which the U.S. government has apparently been participating, sometimes reluctantly, according to an article in The New York Times last week. The cybercampaign against Iran apparently began under the Bush administration working with Israel, and continued under Barack Obama, who voiced concern about the precedent America was setting.

The resulting Stuxnet virus, aimed at disabling Iran's nuclear refineries, ended up getting loose on the Internet in the summer of 2010. The revelation of U.S. involvement with the virus worried Obama, according to the Times article, as it could justify future cyberattacks on Americans by enemies of the United States.

Flame may or may not be another product of this same campaign.

When asked about his nation's complicity in the malware, Israeli Vice Prime Minister Moshe Ya'alon cheekily told Army Radio, "Israel is blessed with high technology." But the rest of us are blessed with high technology, too.

What's to keep malware such as Flame from being used against civilian populations or even by civilian populations?

Nations have been using computers for warfare since computers existed. The development of the modern computer was in no small part accelerated by World War II. America's ENIAC computer calculated artillery trajectories, while Britain's Colossus computer decoded the Nazi's encrypted messages. At the time, however, computers were not household appliances. Like cannons and other weapons of war, they were tools of the state and inaccessible to regular folks.

And while the current cyberwar may be a nation vs. nation affair, the kinds of technologies unleashed in this conflict are not beyond the technical capability of more rogue hackers and criminals. The same technologies that let the U.S. and Israel thwart Iran's nuclear program can also enable, say, an Eastern European crime syndicate to participate in your banking activity.

What makes Flame unique -- and almost certainly of government origin -- is that it appears to have been written in a way that not only slows detection and countermeasures, but that also slows the spread of its techniques. The complete suite of programs is over 20 megabytes.

And while at first glance this seems to be a downside -- an elephant hiding in plain sight -- it has actually served to keep it unnoticed for at least two years. More importantly, it was made huge on purpose. Much of its code is simply camouflage -- 3,000 lines of programming that make it hard to understand and even harder for an enemy team of coders or even hackers in the civilian population to copy and use themselves.

It's as if its programmers were attempting to be responsible or at least exclusionary, and to prevent the weaponization of the greater Internet. Now that's classic government behavior. It's also probably futile.

Such efforts will likely only slow this inevitable slide toward an Internet that feels as blocked by security checks as an international airport. For in truth, we are all blessed with high technology.

Follow us on Twitter @CNNOpinion

Join us on Facebook/CNNOpinion

The opinions expressed in this commentary are solely those of Douglas Rushkoff.

ADVERTISEMENT
Part of complete coverage on
July 12, 2014 -- Updated 1815 GMT (0215 HKT)
To prevent war with North Korea over a comedy, what would Dennis Rodman say to Kim Jong Un? Movie critic Gene Seymour weighs in.
July 11, 2014 -- Updated 1315 GMT (2115 HKT)
Michael Werz says in light of the spying cases, U.S. is seen as a paranoid society that can't tell friends from foes.
July 11, 2014 -- Updated 1317 GMT (2117 HKT)
Eric Liu explains why in his new book, he calls himself "Chinese American" -- without a hyphen.
July 11, 2014 -- Updated 1512 GMT (2312 HKT)
John Bare says hands-on learning can make a difference in motivating students to acquire STEM skills.
July 11, 2014 -- Updated 1320 GMT (2120 HKT)
Karl Alexander and Linda Olson find blacks and whites live in urban poverty with similar backgrounds, but white privilege wins out as they grow older.
July 10, 2014 -- Updated 1620 GMT (0020 HKT)
Frida Ghitis says a poll of 14 Muslim-majority nations show people are increasingly opposed to extremism.
July 10, 2014 -- Updated 1828 GMT (0228 HKT)
Ruben Navarrette says spending more on immigation enforcement isn't going to stop the flow of people seeking refuge in the U.S.
July 10, 2014 -- Updated 2048 GMT (0448 HKT)
Faisal Gill had top security clearance and worked for the Department of Homeland Security. That's why it was a complete shock to learn the NSA had him under surveillance.
July 10, 2014 -- Updated 1841 GMT (0241 HKT)
Kevin Sabet says the scientific verdict is that marijuana can be dangerous, and Colorado should be a warning to states contemplating legalizing pot.
July 9, 2014 -- Updated 2047 GMT (0447 HKT)
World War I ushered in an era of chemical weapons use that inflicted agonizing injury and death. Its lethal legacy lingers into conflicts today, Paul Schulte says
July 10, 2014 -- Updated 1137 GMT (1937 HKT)
Tom Foley and Ben Zimmer say Detroit's recent bankruptcy draws attention to a festering problem in America -- cities big and small are failing to keep up with change.
July 10, 2014 -- Updated 1201 GMT (2001 HKT)
Mel Robbins says many people think there's "something suspicious" about Leanna Harris. But there are other interpretations of her behavior
July 9, 2014 -- Updated 1753 GMT (0153 HKT)
Amy Bass says Germany's rout of Brazil on its home turf was brutal, but in defeat the Brazilian fans' respect for the victors showed why soccer is called 'the beautiful game'
July 9, 2014 -- Updated 2107 GMT (0507 HKT)
Aaron Carroll explains how vaccines can prevent illnesses like measles, which are on the rise
July 9, 2014 -- Updated 0008 GMT (0808 HKT)
Aaron Miller says if you think the ongoing escalation between Israel and Hamas over Gaza will force a moment of truth, better think again
July 8, 2014 -- Updated 1903 GMT (0303 HKT)
Norman Matloff says a secret wage theft pact between Google, Apple and others highlights ethics problems in Silicon Valley.
July 8, 2014 -- Updated 2237 GMT (0637 HKT)
The mother of murdered Palestinian teenager Mohammed Abu Khder cries as she meets Palestinian president Mahmoud Abbas in Ramallah, West Bank on July 7, 2014.
Naseem Tuffaha says the killing of Israeli teenagers has rightly brought the world's condemnation, but Palestinian victims like his cousin's slain son have been largely reduced to faceless, nameless statistics.
ADVERTISEMENT