Mesh Networking DDoS Turn
Internet access would go through mesh networking. That’s the suitcase strategy
Kananen 6/17/2011 – Writer for the Beginner (Marko, “Shadow Internet? Freedom or Control,” The Beginner, http://www.thebeginner.eu/technology/all-in-innovation/538-shadow-internet--freedom-or-control - JAK)
Tools that would enable citizens ... impossible to shut down or control.
That’s susceptible to DoS attacks.
Siddiqui & Hong 07 – Department of Computer Engineering, Kyung Hee University (Muhammad Shoaib & Choong Seon, “Security Issues in Wireless Mesh Networks,” paper presented at the 2007 International Conference on Multimedia and Ubiquitous Engineering, online – JAK)
High level security issues for WMNs ... IDS/IPS is difficult to deploy in WMNs.
Collapses the network. The more access, the easier the attack.
Thomas, February 2 (Keir, “Will DDoS Attacks Take Over the Internet?” PC World, 2011)
In its Network Infrastructure Security ... DDoS attacks launched by their desktop brethren.
The Syrian Electronic Army will use DoS attacks to collapse the network, takes out solvency
Fisher & Keller 8/31/2011 – Associate Editors, The Atlantic (Max & Jared, “Syria’s Digital Counter-Revolutionaries,” The Atlantic, http://www.theatlantic.com/international/archive/2011/08/syrias-digital-counter-revolutionaries/244382/ - JAK)
The Syrian Electronic Army has ...on President Barack Obama's Facebook page:.