Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER

Cyber Attacks 10 Years On—From Disruption To Disinformation

By Tom Sear, The Conversation | April 27, 2017

Today is the tenth anniversary of the world’s first major coordinated “cyber attack” on a nation’s internet infrastructure. This little-known event set the scene for the onrush of cyber espionage, fake news and information wars we know today.

In 2007, operators took advantage of political unrest to unleash a series of cyber measures on Estonia, as a possible form of retribution for symbolically rejecting a Soviet version of history. It was a new, coordinated approach that had never been seen before.

Today, shaping contemporary views of historical events is a relatively common focus of coordinated digital activity, such as China’s use of social media to create war commemoration and Russia Today‘s live-tweeting the Russian Revolution as its centenary approaches.

In 2017 and into the future, it will be essential to combine insights from the humanities, particularly from history, with analysis from information operations experts in order to maintain cyber security.

Estonia ground to a halt

A dispute over a past war triggered what might be called the first major “cyber attack“.

On April 27, 2007 the Government of Estonia moved the “Soldier of Tallinn” – a bronze statue that commemorated the Soviet Army of World War II – from the centre of the city to a military cemetery on Tallinn’s outskirts. The action followed an extensive debate over the interpretation of Estonia’s past. A “history war” concerning the role of the Soviet Union in Estonia during and after World War II had split Estonian society.

Several days of violent confrontation followed the statue’s removal. The Russian-speaking population rioted. The protests led to 1,300 arrests, 100 injuries and one death. The disturbance became known as “Bronze Night”.

A more serious disruption followed, and the weapons were not Molotov cocktails, but thousands of computers. For almost three weeks, a series of massive cyber operations targeted Estonia.

The disruption – which peaked on May 9 when Moscow celebrates Victory Day – brought down banks, the media, police, government networks and emergency services. Bots, distributed denial-of-service (DDoS) and spam were marshalled with a sophistication not seen before. Their combined effects brought one of the most digital-reliant societies in the world to a grinding halt.

The Tallinn Manual

In the aftermath, NATO responded by developing the NATO Cooperative Cyber Defence Centre of Excellence in Estonia. A major contribution of the centre was the publication of the Tallinn Manual in 2013 – a comprehensive study of how international law applied to cyber conflict. The initial manual focused on disabling, state-based attacks that amount to acts of war.

Tallinn 2.0 was released in February 2017. In the foreword, Estonian politician Toomas Hendrik Ives argues:

In retrospect, these were fairly mild and simple DDoS attacks, far less damaging than what has followed. Yet it was the first time one could apply the Clausewitzean dictum: War is the continuation of policy by other means.

The focus of the new manual reveals just how much the world of cyber operations has changed in the ten years since Bronze Night. It heralds a concerning future where all aspects of society, not just military and governmental infrastructure, are subject to active cyber operations.

Now the scope for digital incursions by one nation on another is much wider, and more widespread. Everything from the personal data of citizens held in government servers to digitised cultural heritage collections have become issues of concern to international cyber law experts.

A decade of cyber operations

In the ten years since 2007 we have lived in an era where persistent cyber operations are coincident with international armed combat. The conflict between Georgia (2008) and Russia, and ongoing conflict in the Ukraine (since 2014) are consistent with this.

These operations have extended beyond conventional conflict zones via intrusion of civic and governmental structures.

There are claims of nation-state actors active measures and DDoS incidents (similar to those that may have disabled last year’s Australian census) on Kyrgyzstan and Kazakhstan in 2009.

German investigators found a penetration of the Bundestag in May 2015.

The Dutch found penetration in government computers relating to MH17 reports.

Now, famously, we know there were infiltrations between 2015-16 into US Democratic party computers. Revealed in the last few days, researchers have identified phishing domains targeting French political campaigns.

There are even concerns that, as Professor Greg Austin has explained, cyber espionage might be a threat to Australian democracy.

Recently, the digital forensics of a computer hacked in 1998 as part of an operation tagged Moonlight Maze revealed that it is possible that the same code and threat actor have been involved in operations since at least that time. Perhaps a 20-year continuous cyber espionage campaign has been active.

Thomas Rid, Professor in Security Studies at King’s College London, recently addressed the US Select Committee on Intelligence regarding Russian active measures and influence campaigns. He expressed his opinion that understanding cyber operations in the 21st century is impossible without first understanding intelligence operations in the 20th century. Rid said:

This is a field that’s not understanding its own history. It goes without saying that if you want to understand the present or the future, you have to understand the past.

Targeting information and opinion

Understanding the history of cyber operations will be critical for developing strategies to combat them. But narrowly applying models from military history and tactics will offer only specific gains in an emerging ecosystem of “information age strategies”.

The international response to the “attack” on Estonia was to replicate war models of defence and offence. But analysis of the last ten years shows that is not the only way in which cyber conflict has evolved. Even the popular term “cyber attack” is now discouraged for incidents smaller than Estonia, as risks on the cyber security spectrum have become more complex and more precisely defined.

Since Estonia 2007, internet-based incursions and interference have escalated massively, but their targets have become more diffuse. Direct attacks on a nation’s defence forces, while more threatening, may in the future be less common than those that target information and opinion.

At the time, the attack on national infrastructure in Estonia seemed key, but looking back it was merely driving a wedge into an existing polarisation in society, which seems to be a pivotal tactic.

Nations like Australia are more vulnerable than ever to cyber threats, but their public focus is becoming more distributed, and their goal will be to change attitudes, opinions and beliefs.

A decade ago in Estonia, a cyber war erupted from a history war. The connection between commemoration and information war is stronger than ever, and if nations wish to defend themselves, they will need to understand culture as much as coding.

You might also like


Filed Under: Industry regulations + certifications

 

LEARNING CENTER

Design World Learning Center
“dw
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for Design Engineering Professionals.
Motor University

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Robot Integration with Rotary Index Tables and Auxiliary Axes
  • How to Choose the Right Rotary Index Table for Your Application
  • Designing a Robust Rotary Index Table: Engineering Best Practices for Long-Term Performance
  • Custom Integration Options for your New and Existing Rotary Table Applications
  • Tech Tips: Crossed Roller Bearing Update
  • Five Uses for the Parvalux Modular Range
View More >>
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Control Engineering
  • Consulting-Specifying Engineer
  • Plant Engineering
  • Engineering White Papers
  • Leap Awards

Copyright © 2026 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER
We use cookies to personalize content and ads, to provide social media features, and to analyze our traffic. We share information about your use of our site with our social media, advertising, and analytics partners who may combine it with other information you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.