US Planning Response To a Cyber Attack 359
We've all heard of Google bombing; the US Government may be taking the expression rather literally. Planning is now underway across the government for the proper way to respond to a cyber attack, and options on the table include launching a cyber counterattack or even bombing the attack's source. The article makes clear that no settled plan is in place, and quotes one spokesman as saying "the preferred route would be warning the source to shut down the attack before a military response." That's assuming the source could be found. From the article: "If the United States found itself under a major cyberattack aimed at undermining the nations critical information infrastructure, the Department of Defense is prepared, based on the authority of the president, to launch a cyber counterattack or an actual bombing of an attack source."
Bombs? That's ok... (Score:5, Insightful)
Military action is unlikely to be a solution (Score:5, Insightful)
There's a lot wrong with this. Off the top of my head...
Any sustained attack on network infrastructure, on the scale that they're talking about, is almost certainly going to be a distributed attack. Botnets have no patriotic allegiance, their locality is a function of machine vulnerability (eg: N. Korea's dependence on Active-X), not politics.
If I'm crafting an attack, I don't have to even tell the truth about my IP address, TCP allows the sender to specify a (fake) IP address. Obviously I won't get any replies, but I don't care if I'm simply out to cause damage
Geolocation of IP addresses is pretty much a black art as well - there's far too much variability by IP address to try and localise to the precision needed for bombing the source. My hostip.info [gornall.net]website only attempted to locate to the
Not to mention that it's a pretty big precedent to set... At least they're talking about talking, before bombing; the problem is that if you make a threat to bomb someone, you have to be prepared to carry it out. Countries can't afford to be seen to be bluffing when it comes to things like this, the impact on future negotiations is too high.
Simon.
tilte confusing, google has nothing to do with it. (Score:5, Insightful)
Instead, the US is just aknowledging that attacks on it's internet infrastructure can be responded to just like physical attacks.... by military attack.
Is anyone suprised that if one place was pinpointed as the source of the attack on any countries infrastructure it might be a target? I'm not. The net is more important than some buildings at this point.
The only thing I'm suprised is to expect any attack to be from one place... I'd expect it to be distributed. But thats ok, we have bombs for that too. ouch.
quicken the disolving of the union. (Score:1, Insightful)
You think this is a bad thing?
It all goes to hasten the secession of the northern states from the inbread war mongering oil states.
Instead of physical bombing (Score:4, Insightful)
Re:It doesn't matter where the attack in terms of (Score:4, Insightful)
You can be quite sure, even now before the attack has started, that the intelligence will point to Iran being responsible. In fact, it is most likely that Iran will be have to be bombed before the cyber attack starts, in order to preempt it
I think.... (Score:5, Insightful)
I'm not sure if I agree with everything in the article but it is the Government's job to protect this country and there are a lot of businesses and people that demand on the internet. If some outside source could mess with this it would be devastating to the economy and the country...
Re:botnet (Score:3, Insightful)
Re:Military action is unlikely to be a solution (Score:3, Insightful)
Re:Bombs? That's ok... (Score:5, Insightful)
That is only true if all responsible parties are held to a reasonable level of accountability.
If you found out that your oven was, without your knowledge, part of a local arson ring, you'd be pretty upset a being held accountable for the neighborhood damages. You'd probably blame Kenmore for making such a thing remotely possibly in the first place, since it has no connection with how or why you bought the oven in the first place.
Until the hardware mfgrs, OS mfgrs, software mfgrs, and users are all held to roughly similar standards, you can't place all blame on the user.
To put things a different way:
-If 1% of your products cause widespread damage, then 1% of your users are idiots.
-If 5% of your products cause widespread damage, then 5% of your users need training.
-If 25% of your products cause widespread damage, then you are the idiot.
Re:Hell Yeah (Score:3, Insightful)
This proves it works.
Re:It doesn't matter where the attack in terms of (Score:3, Insightful)
NY Times - U.S. Presents Evidence of Iranian Weapons in Iraq [nytimes.com]
The article does mention that the claims about Iran "[are] bound to generate skepticism among those suspicious that the Bush administration is trying to find a scapegoat for its problems in Iraq and, some political analysts and White House critics believe, is looking for an excuse to attack Iran." Beyond that, it appears to be the same sort of echoing of administration propaganda (conveyed by unnamed intelligence officials) that we saw in the run-up to the invasion of Iraq.
Re:Bombs? That's ok... (Score:3, Insightful)
Along the same lines, it has always irked me that (the government) has never considered approaching Microsoft about the severe security flaws to which it's software is subject. Certainly if the most popular operating system in the world were less morbidly insecure, botnets and the like but be far fewer between. After all, these botnets aren't being built out of *NIX machines, so we're really talking about MS software.
I think a certain amount of responsibility lies on the endusers shoulders insofar as they should be expected not to compromise their own machines, but when you get your brand new windows PC it is vulnerable out of the box. It seems to me like microsoft is selling a consumer product that represents a great potential for illegal/malignant misuse, that most consumers are largely unaware of beyond "If I don't install virus-protection software I will get adware on my machine".
I've always found it wildly absurd that no real authority has ever stepped up to microsoft and made them do something about the woeful state of their OS in terms of security. It seems like one of the best responses that we could have to such attacks it to force Microsoft to mend its ways, if at all possible. If not, at the very least, produce some kind of government-issued label as used in cigarrete boxes to indicate to the consumer that "this product is wildly insecure and if you use it, small children will vomit on your shoes". At least in that case you could pass some of the responsibility on the end user.
Re:Bombs? That's ok... (Score:4, Insightful)
Re:Bombs? That's ok... (Score:5, Insightful)
You buy a new drive-by-wire car. Then either of the following happens: You forego the option to park your car in a readily-available garage and a terrorist quietly breaks into it, or you simply take the car to a garage that you thought was reputable because of its professional-looking store front but was in fact a terrorist-run shop. Either way, they had their way with your car, installing hidden remote controls on the drive-by-wire system. Then they install a bomb using any available space, such as the empty body panels, inside the seats, etc. They can now damage or destroy any bridge they like, but you never knew what they did to your car, so you went on with life as usual. Then they did it to other owners' cars around town that were similarly vulnerable to compromise or social engineering.
Now for the best-case-scenario version of the outcome. We'll assume that the bridge is unoccupied, so there is no human life lost when they take your car and all the other zombie cars on their final joy ride, but the bridge is damaged and has to be closed while its structural integrity is assessed. Meanwhile, traffic has to be rerouted or stopped altogether. People can't get to work. Goods can't be delivered. The general population is afraid that there will be another attack, possibly trapping them in their neighborhood.
Now imagine that the cars were your computer and all the other zombie machines out there, the home garage was a simple NAT router or decent software firewall or the repair shop was a software package that contained malware, and the bridge was any major server or router that a decent-sized portion of the internet population relies on for day-to-day electronic transactions.
Do you really think it was the car manufacturer's fault that you left the car unprotected, or worse, you handed the keys to an untrustworthy mechanic because he had a professional-looking shop? While I don't think the car's owner should be held criminally responsible, I think they unknowingly forfeited the car when they ignored their responsibility to keep it reasonably secure. Don't be surprised if the government starts fragging driverless cars once they've identified them.