recommended reading

U.S. and Estonia forge new cyber relationship

With a population smaller than that of Phoenix, the former Soviet republic of Estonia has grown skilled at taking down international criminal networks operating millions of computers, after the Internet-dependent society became the victim of one such ring in 2007. Now Estonia is sharing its cyber defense know-how with law enforcement agencies throughout NATO, including the FBI.

"Basically, your security agencies -- FBI -- are in fact establishing a representation unit, whatever you want to call it, in Estonia," Estonian President Toomas Hendrik Ilves said in an April interview with Nextgov.

FBI spokeswoman Jenny Shearer confirmed the relationship. "The Estonian National Criminal Police have consistently demonstrated their expertise and willingness to work as equal partners in the fight against cyber crime," she said.

Ilves was in Washington to meet with Army Gen. Keith Alexander, chief of U.S. Cyber Command -- another entity with which Ilves would like to partner.

The Baltic country has "a long-term, very deep and effective cooperation with the FBI on . . . [investigations into] stealing money, whether it's credit cards, through bank transfers," Ilves said. "We work very closely with them. They come to Estonia, we come here."

Estonia unintentionally became an expert at fighting computer intruders in 2007 when a cyberattack, reportedly sponsored by the Russian government, crippled the country's critical infrastructure and government networks for two weeks.

"The reason the cyberattacks had any effect is we had adopted in Estonia, we very consciously adopted computerization of society, government services, as our primary, fundamental motor of development," Ilves said.

While Estonia was under Communist control, the West was constructing highways, public transportation and modern facilities, "but when we came out of the Soviet [era] we were poor, the usual gray people living gray lives in gray buildings with falling-apart infrastructure or nonexistent infrastructure," said Ilves, 57. "We said building roads will take a long time, but we can, however, make a certain leap by computerizing as much as possible."

Today, officials estimate 98 percent of banking transactions are conducted online. While some U.S. precincts still struggle to count paper chads, Estonia has been voting on the Internet since 2005.

"That means you're very, very vulnerable because so much is online," said Ilves, who learned computer programming at age 14 from a math teacher in New Jersey, where Ilves grew up.

The intrusion that brought down Internet services in 2007 was primitive by today's standards, he said, pointing to malicious software such as Stuxnet, a sophisticated worm that reportedly derailed the industrial systems controlling Iran's nuclear operations by reprogramming the machinery to attack itself. In contrast, the distributed denial-of-service attack that hit Estonia was essentially a spam blitz coordinated by criminals funded, allegedly, by the Russian government.

"In general, what they do is all these computers that are robots, bot computers, are sending out all kinds of silly spam," Ilves said. "You can get all these networks of computers to send messages to one computer. Then you get hundreds of thousands of repeated messages to one address and you basically freeze out the server."

When Estonia's computer emergency response team deconstructed the incident afterward, a specialist showed Ilves that the onslaught reached its peak, "frizzed out everything" and then dropped back to zero. When the president asked why the barrage didn't slowly peter out after reaching its climax, Ilves was told, the money ran out. "I said, 'What do you mean the money ran out?' [The specialist] said these botnets were rented. There was probably a comparable massive decline in the amount of Viagra spam. It was clear it was organized and paid for."

Such denial-of-service attacks are pinpricks compared to the amount of damage that adversaries now have the power to unleash with tactics such as advanced persistent threats, which lurk silently inside networks until they detect -- and download -- the intelligence they want. In March, just such a threat penetrated an RSA Security system containing information related to smart card IDs and key fob credentials used by many federal personnel.

"The amount of espionage that goes on, on the Web, is absurd and ridiculous," Ilves said. "I don't trust anything anymore."

He is particularly concerned about the vulnerability of the Internet phone provider Skype, a global business with research and development operations in Estonia. "They're putting millions [of dollars] if not more into developing new products and they have all these people working for them," Ilves said. "Now if someone gets into their system, takes out the new code that they've developed, they get it for free and they can start making exactly the same thing. This is what countries are waking up to finally."

Countries like the United States. In 2010, the FBI assigned a full-time cyber-trained investigator to work directly with the Estonian National Criminal Police on cyber crime matters.

"The FBI's decision to assign a full-time cyber investigator was based upon years of successful partnering on joint investigative matters," said Shearer.

Tallinn, the capital, is home to NATO's Cooperative Cyber Defense Center of Excellence, which is working to foster global cybersecurity collaboration by developing tools and best practices.

America could use some help in the cyber detective department, apparently. According to a recent audit by the Justice Department inspector general, more than a third of 36 FBI agents questioned said they lacked the networking and counterintelligence expertise to investigate national security intrusion cases.

Nevertheless, a joint U.S.-Estonia international investigation recently brought a major cyber ring to justice. In August, American law enforcement officials announced the extradition of a suspect from Estonia to the United States for arraignment on federal charges of, among other things, computer fraud and aggravated identity theft.

The Estonian suspect, aided by associates in Russia and Moldova, allegedly hacked into a network belonging to RBS WorldPay, the U.S. payment processing division of the Royal Bank of Scotland Group PLC, located in Atlanta.

Using customer data pinched from debit cards, the culprits in November 2008 generated 44 counterfeit cards to withdraw more than $9 million from ATMs in at least 280 cities worldwide, including cities in the United States, Estonia and Italy.

"Due to our strong partnership with the Estonian government on cyber matters, the case resulted in one of the first hackers extradited from Estonia to the United States," Gordon Snow, assistant director the FBI's cyber division, told lawmakers on April 12 at a hearing on cyber crime.

Threatwatch Alert

Network intrusion / Software vulnerability

Hundreds of Thousands of Job Seekers' Information May Have Been Compromised by Hackers

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.