Digital Attack Map (Google Ideas)
From the curators: DDoS (Distributed Denial of Service) attacks are not a new phenomenon, with the first being recorded in the late 1990s. DDoS attacks are online invasions that infect a network of machines, resulting in a surge of activity from them to a target website, server, machine, or network resource, subsequently causing their mark to buckle under the pressure. DDoS attacks are perpetrated against multinational corporations, political administrations, and individuals, often causing heavy personal and financial losses. Google Ideas, Google’s Big Picture Team, and security experts Arbor Networks, Inc., teamed up to create the Digital Attack Map, one way to visualize—in real time—these elusive attacks being carried out across the globe. This interactive map documents the daily acts of DDoS cyberwarfare using data from Arbor Networks, Inc., customers who have agreed to share anonymous network traffic and attack statistics. This process of data visualization allows us to understand trends and patterns over time. The controversial nature of these online threats is perhaps more difficult to parse. Are we witnessing anti-capitalist hacktivism? State-sponsored terrorism? Corporate espionage? In our post–Edward Snowden reality, there are no ready answers for where the real “violence” in our online communications and actions lies.
The early era of the Internet was all glowing green text-only VT100 console displays in computer labs on XTerms, connected over dial-up modems, UUCP, and Usenet; a smaller set of people, mostly engineers and academics using, as well as designing, its protocols; playing MUDs or arguing over newsgroup hierarchies; unbounded and breathless enthusiasm for the possibilities of the future, for humanity; delight and wonder imagined and experienced in this once-safe space, before trolls, “clueless” users, spam, viruses, and hacks invaded.
Clearly, so much has changed.
Today, large swaths of the population are plugged into the Net, and it encompasses every sphere of human activity in all of its component parts: trite and tiring work; entertainment, business, and money making; informal and formal education; love, romance, and pornography; wily protest and civic endeavors; crime, intrigue, and conflict. Despite these transformations, and barring small moments of breakdown or annoyance, most of its users, at least those with decent access, still experience the Internet as smooth and frictionless. They are blissfully unaware of its knotted and turbulent underworlds, or the worlds from which it grew.
But technologists, like the system administrators who tend to the software and hardware that make this world come alive, work around the clock to contain the fires, mishaps, breakdowns, and conflicts that constantly bedevil the Internet. A computer, upon connection, is immediately at risk. The wilds of the Internet are constantly bombarding a system, either erroneously, maliciously, or experimentally. The deluge of problems, an exhaustive list that cannot possibly be enumerated, includes everything from spam, software compromises, and malware to denial of service attacks. The last of these now lands regularly in the news, thanks in part to its prolific use as a protest tactic. No longer simply residing in the realm of technical expertise, it has become a topic of careful contemplation and heated debate. Early Internet denizens are awed when they hear news reports of DDoS. For them, it is worlds colliding: not long ago they lived in a futuristic bubble, where the mere prospect of explaining e-mail, even, was dismissed as an impossible endeavor.
If the DDoS has percolated into public consciousness, it has done so in fits and bursts, carried by purposive attacks meant to send a political message, or those of incidentally massive scale. Many are unaware of the event’s omnipresence—multiple attacks are happening at this very instant. Yet, like so many conflicts online, while it may be a constant, its existence has remained submerged, impossible for the public to see, gauge, or even sense. There is no photograph of a DDoS to tweet, no place for a witness to stand to view the phenomenon first hand, no object to hold up to the light and examine.
The Digital Attack Map swoops in to fill this void, rendering the invisible and arcane into the visible and legible. Its most important achievement is the simple fact of revealing presence. It shows not only that DDoS attacks are ongoing but also where they are happening and to what intensity. You can see the entire globe in one frame and watch the geyser of activity, represented through so many streams of candy colored bubbles.
The difficult task of showcasing a world’s worth of complicated information in a visually beautiful, streamlined, and uncluttered presentation is stunningly accomplished but necessarily limited. The data animating the map is massive, yet partial. The map can only offer glimpses into what is happening and can never reveal the motivating question of why different attacks happen. The source is almost always hidden, through misdirection and cloaking. Still, in the face of necessary incompleteness, this object’s design shrewdly intervenes to offer more than a simple representation of the technical data on which the map is built, nudging it into the messy realm of social life. The map connects us to news reports that offer scraps of clues as to motivation and source.
The patterns and flows might reveal broad geopolitical realities. At this point in time, Africa is rarely the target destination for DDoS attacks. A net positive, one might think—until considering that this happy state of affairs is predicated on digital desolation, an entrenched artifact of colonial underdevelopment. Russia, North America, much of Western Europe, and China, on the other hand, are constantly assailed. We can observe that geopolitical power is a magnet for conflict.
We can see also, nearly every day, an attack or two that demands individual scrutiny. In mid-March Peru was one of the lone South American nations on the receiving end of DDoS. Might it be in retaliation for the government’s crackdown against nude streakers in Machu Pichu? Or is it something far more invisible? A war between drug lords over failed shipments, a political effort to stifle speech, or simply some misconfigured technology going haywire, attempting to access a server ad infinitum, until some human takes note and makes it stop.
The map provides no answers to these questions. But the fact that it prompts us to even ask them at all makes this design compelling. Even if it cannot fully capture the architectonics and emotional valences the DDoS carries into our world, it allows us to see the Internet on slightly different terms, to grasp its dynamism, see its supports and imagine it as contested. To get at its infrastructure, and the labor required to maintain it, carries us a step away from the false idols of immateriality that have plagued Internet studies for so long. The attack map places the Internet squarely into a plane of its lived messy and conflicting actualities.