On Friday, January 14, 2011, after almost 30 days of increasingly violent protests and government efforts to qwell them, the President of Tunisia Zine el Abidine BEN ALI, who had been in power for 23 years, fled the country. The Prime Minister Mohamed Ghannouchi assumed control of the government and declared a state of emergency. The “Jasmine Revolution” had begun, and immediately made history as Tunisia became the first nation in the Arab world to have its leader removed through a popular uprising of its citizens or, more precisely, its netizens thanks to Tunisia’s modern communications infrastructure, pervasive Internet access and a completely digitized mobile phone network.
BEN ALI’s repressive regime against journalists dates back a long time but the spark for this revolution was the self-immolation of a street vendor named Mohamed Bouazizi on December 17th. Ethan Zuckerman has a great article about events in Tunisia wherein he describes what happened next:
Bouazizi’s suicide struck a chord with other frustrated Tunisians. Thousands took to the streets in Sidi Bouzid to protest widespread unemployment, government corruption and lack of opportunity. Another frustrated youth in Sidi Bouzid, Lahseen Naji, killed himself by climbing an electricity pylon while crying out “No for misery, no for unemployment!” before grasping the high voltage line. The Tunisian government responded by sending baton and teargas-wielding reinforcements to the city and by promising future economic development projects. But riots have spread from Sidi Bouzid across the country, and the government has responded by closing the high schools and universities, arresting those they perceive to be ringleaders and imposing a curfew. Global Voices contributor Slim Amamou was one of those arrested on January 6th – we’ve not heard from him or been informed of the charges.”
Besides physical protests and demonstrations, many Tunisians used social media to vent their outrage which prompted an increase in an already repressive government censorship program run by the state’s one ISP – the Tunisia Internet Agency. According to IFEX, they began “modifying web pages on the fly to steal usernames and passwords for sites such as Facebook, Google and Yahoo!,” deleting or compromising accounts and even using the information to locate bloggers and their network of contacts.”
Enter Anonymous, fresh off their DDoS attacks on behalf of Julian Assange and WikiLeaks. Their new targets were Tunisian government websites belonging to the President, the Prime Minister, and other official sites.
This is a warning to the Tunisian government,” Anonymous stated. “Any organisation involved in censorship will be targeted and will not be released until the Tunisian government hears the claim for freedom to its people.”
On January 6, Al-Jazeera published an excellent report entitled “Tunisia’s Bitter Cyberwar” that documents the government’s use of spear phishing and other hacking tactics to identify and silence dissidents and journalists. This included hacking and deleting information at Gmail accounts and private Facebook accounts.
The one social media outlet that the Tunisian government could not impede access to was Twitter since it can be accessed through mobile clients rather than through a website.
The uprising has been hashtagged,” says Egyptian-born columnist Mona Eltahawy. “A stream of tweets, all including #Sidibouzid, flows through my Twitter feed every day in Arabic, English and French, carrying links to Tunisian blogs, video filmed by protesters and live updates from solidarity demonstrations in other Arab cities.”
What we are witnessing in Tunisia in real-time is another example of the evolution of offensive cyber operations to the level of multi-modal warfare. I first began speaking about this topic last May during my presentation at TTI/Vanguard’s Cyber Insecurity conference and have included it in all of the military and corporate briefings that I’ve given since then. I’ve defined multi-modal warfare as the planning and execution of a physical assault against a targeted individual or group where cyber operations are fully integrated throughout.A key part of its success relies on the increasing popularity of social networks and the resulting ease with which an adversary can gather enough personal information to:
- identify a target
- breach his network or device
- customize a mode of attack
- execute the attack
Some examples from 2010 are:
- The assassination of Gennady Pavliuk by the Kyrgyzstan intelligence service (December, 2009)
- The arrest and jailing of Iranian dissidents by the Iranian Revolutionary Guard Corps (April, 2010)
Tunisia’s Jasmine revolution can now be added to that list.