Page 2 of 2 FirstFirst 12
Results 16 to 24 of 24

Thread: A new way to start a conventional war.

  1. #16
    Join Date
    9th October 2003 - 11:00
    Bike
    2022 BMW RnineT Pure
    Location
    yes
    Posts
    14,591
    Blog Entries
    3
    Quote Originally Posted by Scuba_Steve View Post
    only if China has resources the US wants
    They do. All the money the US used to have.
    If a man is alone in the woods and there isn't a woke Hollywood around to call him racist, is he still white?



  2. #17
    Join Date
    1st November 2005 - 08:18
    Bike
    F-117.
    Location
    Banana Republic of NZ
    Posts
    7,048
    9 June, 2011: The U.S. government is trying to develop a way to respond to a serious Cyber War attack, one in which the attacker does not reveal who they are. A document has been prepared that lists what kind of attack would qualify as an "act of war", and thus deserving of a violent response. That shouldn't be too hard, especially if substantial physical damage was done by the attack. This was the case in Iran last year, after the Stuxnet worm got finished with their uranium enrichment centrifuges. Similar damage could be done with electrical power systems, water and sanitation utilities and some kinds of industrial facilities (steel making, chemical, refineries, and so on.)

    The big problem is not proving some malignant software was inserted in a facility and did damage. The big problem is proving who did it. While you can trace an attack, you can also, as the attacker, leave a false trail to another location (in another country). What the Americans are apparently trying to do is establish criteria for "network forensics" (investigating an attack and tracing where who came from where for what purpose) that will be widely accepted. At present, there are no such generally accepted criteria for proving who carried out a Cyber War attack.

    The United States is apparently seeking to establish a method of identifying those who make these attacks and obtain international recognition of that guilt, so that America can then deliver some kind of retribution. This may involve nuclear weapons, but that would be a last resort. There are many other punishments that can be used, from diplomatic, economic, and up through non-nuclear military actions. Meanwhile, the United States is hustling, at least as far as press releases go, to improve American defences against Cyber War class attacks.
    But there is growing resistance to calls for more government regulations and mandates meant to protect America from this Internet based aggression. Civilian organizations fear that the government intervention will hurt network security. Worse, it's difficult to get a rational discussion going on the subject, not with all the fear mongering by the mass media and government officials, plus defence contractors looking for more money.

    For example, FBI (which is responsible for detecting and investigating Internet based crime) has been issuing increasingly scary warning that America is becoming ever more vulnerable to "cybergeddon" (a massive attack via the Internet that would cripple the economy, government and military.) The FBI admits that it has a hard time getting more money for their Internet security efforts. And a major reason is that the threat is largely invisible. A picture of a nuclear bomb going off, or of enemy tanks and warships ready to attack makes a much more effective impression on the politicians who dole out the money.

    The FBI also wants to get the Department of Defence Internet defence operations more involved in national level defence against network based attacks. But the four services have a hard time agreeing to coordinate their efforts to defend military use of the Internet when under massive hacker attack. Thus the FBI plea for help sort of falls on distracted ears. But a growing number of politicians, and headline hungry journalists, are seeking to change that. The problem is, no one is exactly sure of how to do that.
    While the politicians are eager to "do something," there is little consensus on exactly what the something should be, and to what degree the government should be involved. For example, Internet technology changes far more quickly than new laws can be passed to adapt and keep up. Companies fear that government interference will drive their operating costs up, while providing little, or no, protection from Cyber War attacks.

    A big problem is that there hasn't been a proper, all-out Cyber War yet. There have been lots of skirmishes, but nothing approaching what an all out battle, via the Internet, would be. What would the first Cyber War be like? Let's be blunt, no one really knows. But based on the cyber weapons that are known to exist, and the ones that are theoretically possible, one can come up with a rough idea.

    First, there are three kinds of Cyber War possible. Right now, we have limited stealth operations (LSO), as Chinese, Russian, and others, use Cyber War techniques to support espionage efforts. China is the biggest practitioner, or at least they have been caught most often. But getting caught carrying out Cyber War operations does not mean you have any human prisoners, just a pile of computer forensics. The Chinese simply deny everything and carry on.

    Next comes Cyber War only (CWO). This is open use of a full range of Cyber War weapons. No one has admitted doing this yet, and it's potentially less dangerous than firing missiles and unleashing tank divisions. It is believed that Russia indulged in this in 2007, when Estonia infuriated the Russians by moving a World War II statue memorializing the Soviet "liberation" of Estonia (which didn't want to be liberated by the Soviet Union.) Russia denied responsibility for the massive Cyber War assaults on Estonia, which nearly shut down the nation's Internet infrastructure. Estonia accused Russia of being responsible, and tried to invoke the NATO mutual-defence pact. NATO Cyber War experts went to Estonia, and shortly thereafter the attacks stopped. Apparently Russia got the message that this sort of thing could escalate into something more conventional, and deadly. This sort of thing is being cited by the United States as a reason for coming up with "this is war" criteria.

    Then we have Cyber War in support of a conventional war. Technically, we have had this sort of thing for decades. It has been called "electronic warfare" and has been around since World War II. But the development of the Internet into a major part of the planet's commercial infrastructure, takes "electronic warfare" to a whole other level. Cyber War goes after strategic targets, not just the electronic weapons and communications of the combat forces.

    A successful Cyber War depends on two things; means and vulnerability. The "means" are the people, tools and cyber weapons available to the attacker. The vulnerability is the extent to which the enemy economy and military use the Internet and networks in general. We don't know who has what Cyber War capabilities exactly, although China and the U.S. have openly organized Cyber War units, and both nations have lots of skilled Internet experts.

    Vulnerability is another matter. The United States is the most exposed to Cyber War attack because, as a nation, we use the Internet more than any other country. That's the bad news. The good news is that if an attacker ever tried to launch a Cyber War by assaulting the U.S., it could backfire. This risk has to be kept in mind when considering what a Cyber War might do. Recall military history. The Pearl Harbour attack in 1941 actually backfired on the Japanese, by enraging Americans and unleashing a bloodthirsty response that left Japan in ruins. The lesson of the original Pearl Harbour is, if you're going to hit someone this way, better make it count. If your opponent is bigger than you, and gets back up, you could be in some serious trouble.

    The big problem with Cyber War is that there has not been a lot of experience with it. Without that, no one is really sure what will happen when someone attempts to use it at maximum strength. But unlike nuclear weapons, there is far less inhibition about going all-out with Cyber War weapons. That is the biggest danger. Cyber War is a weapon of growing might, and little restraint by those who wield it. Things are going to get a lot worse.
    TOP QUOTE: “The problem with socialism is that sooner or later you run out of other people’s money.”

  3. #18
    Join Date
    4th November 2007 - 16:56
    Bike
    A few
    Location
    OSR Clubrooms
    Posts
    4,852
    Quote Originally Posted by scissorhands View Post
    , is it my fault? Or the chimp?
    Which one ?
    A girlfriend once asked " Why is it you seem to prefer to race, than spend time with me ?"
    The answer was simple ! "I'll prolly get bored with racing too, once i've nailed it !"

    Bowls can wait !

  4. #19
    Join Date
    16th December 2006 - 01:50
    Bike
    Trans NZ Broliner
    Location
    Stuck on a roundabout
    Posts
    190
    Its difficult to grasp that some nerdy aspie 16 year old kid on acid from Coromandel or wherever may be an ultimate attack agent.
    Churches are monuments to self importance

  5. #20
    Join Date
    9th November 2006 - 18:42
    Bike
    Ducati V4S Streetfighter
    Location
    Orewa, Auckland
    Posts
    4,120
    Blog Entries
    1
    Nerd hackers at it again.... death to America!!!!!!!
    Click image for larger version. 

Name:	nerd.jpg 
Views:	15 
Size:	48.6 KB 
ID:	240457

  6. #21
    Join Date
    31st March 2005 - 02:18
    Bike
    CB919, 1090R, R1200GSA
    Location
    East Aucks
    Posts
    10,499
    Blog Entries
    140
    Quote Originally Posted by White trash View Post
    If some smart arse Chinese kid is sitting at home trying to hack US military computers ofr a laugh, does that warrant a military response against China?
    If the security of the targetted network is decent enough then it's not quite as easy for one person to individually "hack" a military system... That is why they employ bots. It is however, highly unusual for a large group to act with cohesion, hence the suspicion there is government involvement.
    Quote Originally Posted by Jane Omorogbe from UK MSN on the KTM990SM
    It's barking mad and if it doesn't turn you into a complete loon within half an hour of cocking a leg over the lofty 875mm seat height, I'll eat my Arai.

  7. #22
    Join Date
    9th October 2003 - 11:00
    Bike
    2022 BMW RnineT Pure
    Location
    yes
    Posts
    14,591
    Blog Entries
    3
    I would argue that all attempts at hacking commercial and military sites emanating from China are Government sponsored at the very least.
    If a man is alone in the woods and there isn't a woke Hollywood around to call him racist, is he still white?



  8. #23
    Join Date
    31st March 2005 - 02:18
    Bike
    CB919, 1090R, R1200GSA
    Location
    East Aucks
    Posts
    10,499
    Blog Entries
    140
    Quote Originally Posted by James Deuce View Post
    I would argue that all attempts at hacking commercial and military sites emanating from China are Government sponsored at the very least.
    It's widely believed that is the case... proving it is a whole 'nuther ball game...
    Quote Originally Posted by Jane Omorogbe from UK MSN on the KTM990SM
    It's barking mad and if it doesn't turn you into a complete loon within half an hour of cocking a leg over the lofty 875mm seat height, I'll eat my Arai.

  9. #24
    Join Date
    1st November 2005 - 08:18
    Bike
    F-117.
    Location
    Banana Republic of NZ
    Posts
    7,048
    Quote Originally Posted by Gremlin View Post
    It is however, highly unusual for a large group to act with cohesion, hence the suspicion there is government involvement.
    No suspicion required.
    You have kept up with Mirim* "university"?






    *(or whatever they are calling themselves now)
    TOP QUOTE: “The problem with socialism is that sooner or later you run out of other people’s money.”

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •