Threat of Cyberwar Is Over-Hyped 123
nk497 writes "A new OECD report suggests the cyberwar threat is over-hyped. A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them, and that sub-state actors such as terrorists and individual hackers can't really do much damage. Dr. Ian Brown said, 'We think that describing things like online fraud and hacktivism as cyberwar is very misleading.'"
Well... (Score:4, Interesting)
Good thing the US isn't at involved in any military action with anyone.
Oh wait. is that WoT thing still going?
Re:Well... (Score:4, Insightful)
A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them...
Right. Tell that to the Iranians [nytimes.com] who just lost 984 uranium-enrichment centrifuges to a US/Israeli worm.
Re: (Score:2)
And if the Stuxnet worm wasn't state-developed, then certainly sub-state actors are doing substantial damage.
A line from Cory Doctorow's Little Brother may ... (Score:2)
...also apply to what the authors discard as "less capable states and sub-state actors".
Re:Well... (Score:5, Funny)
Right. Tell that to the Iranians [nytimes.com] who just lost 984 uranium-enrichment centrifuges to a US/Israeli worm.
The official explanation from the British Foreign Office stated that the centrifuges were not lost, but merely resting, after a long squawk, and were pining for the fjords.
Norwegian centrifuges stun easily.
Re: (Score:2)
Just a thought, but considering these events, should underwear be Internet Enabled?
Re: (Score:2)
Re: (Score:2)
It has never been proven that Iranian uranium-enrichment centrifuges where damaged by Stuxnet. The Iranians deny it [www.abna.ir]. I wouldn't rely on the NYT for information about such topics. It might well be a propaganda spin.
Quite right. It's not like the Iranians wouldn't try to hide the fact they got taken for a ride. FWIW, it's been reported by numerous other journalistic outlets, the virus itself has infected countries other than Iran and has been subject to quite a bit of detailed scrutiny.
But of course, it could all be a put on by Symantec.
Re: (Score:2)
It has never been proven that Iranian uranium-enrichment centrifuges where damaged by Stuxnet. The Iranians deny it [www.abna.ir]. I wouldn't rely on the NYT for information about such topics. It might well be a propaganda spin.
That's funny, because the president of Iran admitted it. [guardian.co.uk] He said
That means very little, other than that you probably shouldn't rely on an Iranian news source for actual ne
Like riding a moped (Score:2)
you don't want your friends to see you on one...
Who would admit to Windows on industrial controllers? It is embarrassing, to say the least.
Re: (Score:2)
Your point is well made.
However, the question remains as to whether the US and Isreal, (not to mention the Saudis) were already engaged in military action (covertly), and about to be engaged overtly.
Perhaps there was already military action, just short of lethal weaponry?
The Guardian has a story [guardian.co.uk] that suggests there may have already been an attack on Iranian nuclear facilities by this time had it not been for the success of Stuxnet, as well as targeted assassinations of key scientists.
Add to this the Iranian
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Yeah, they shoulda just used rheostats and some college interns to run around and set the centrifuge speeds manually.
Re: (Score:2)
Re: (Score:3)
I was curious about stuxnet so I read the various stories (though many have quite flimsy evidence), and read up on gas centrifuges as used in enrichment.
Why would they use a PLC to control a centrifuge?
These things operate pretty close to their mechanical limits, and exact speed control is apparently necessary to make sure the forces applied match the gas flow rates and thermal gradient used. Mess up any of those and you won't get good separation. Also, the controllers are designed to power quickly through speeds that are harmonic with the resonant freq
Re: (Score:1)
Re: (Score:1)
Someone has to fire first, and I hope everyone remembers we did.
While I don't want to over-generalize, Russian hackers are top-notch. We have may started a war we're going to lose. As more and more Russian systems go Linux, and we keep writing checks to Microsoft for shoddy code, I expect us to be at a full disadvantage.
Re: (Score:2)
Stuxnet targeted Iran, not Russia.
Re: (Score:2)
Stuxnet targeted Iran, not Russia.
And it is Israel and the US who want to prevent Iran's nuclear power/weapons program, not Russia.
Re: (Score:2)
Who has been helping Iran? Russia.
Re: (Score:2)
The iranians first causes millions of twitter users to turn their icons green. If that is not a first strike, I don't know what is.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Perhaps... (Score:3, Insightful)
Perhaps the "movie science/actual science" effect is going on here...example: people see "Hackers", and think that's what "hacking" is. People then see either a script kiddy in their mom's basement or a government techie with sky-high stacks of paper on his desk (or working at a scarily-clean desk), and realize the actual act is pretty damn boring.
Re: (Score:2)
Re: (Score:2)
Hacking (in all senses of the word) is not a spectator sport. You can't watch someone poking at code or discovering an exploit / compromising a system and understand the feeling of elation unless you, yourself, have felt that elation. The excitement is personal. Or at least, the excitement requires considerable background knowledge. Capturing that is a difficult challenge. As you noted, it tends to make a pretty poor movie scene.
Re: (Score:2)
Re: (Score:2)
Are you saying a chess match would make a good movie scene? And yes - seen a chess match. Not all that interesting unless you're in to the game. Which means you have personal experience and the considerable background knowledge the appreciate it.
Re: (Score:2)
Have you seen the chess match between Kai and the prince of fire in LEXX?
Re: (Score:2)
No. But I have seen LEXX before. As far as I've been able to determine, it isn't a documentary and their take on chess might be somewhat removed from the experiences of the average player.
Re: (Score:2)
It very much removed, but it was both entertaining and technically accurate.
Re: (Score:2)
It very much removed, but it was both entertaining and technically accurate.
Alright - entertaining, yes. But not exactly educational or representing what chess is about. There's been movies done about hacking that are reasonably accurate and entertaining as well. But for the most part, the subject isn't handled well and I still maintain that is because the subject is difficult to handle in an entertaining way without presenting an entirely inaccurate portrayal.
Re: (Score:1)
A chess match is usually much better understandable than program code to a general audience.
Yes and no (Score:5, Insightful)
Yes, describing fraud and hackivism as cyber war is misleadg.
No, it's not over-hyped.
Cyber-war is cheap, the knowledge on how to do it is free, and it doesn't need to take much manpower, as compared to conventional war.
Re: (Score:2)
That depends. Do you wan't to do the bombing with drones?
Re: (Score:1)
So it's like terrorism: it may not necessarily take out a whole city, but it sure the hell can be annoying
It's about control not reality (Score:5, Insightful)
There's no real threat of cyberwar. And there's no real threat of me being blown by an airplane terrorist. But that's completely irrelevant for government leaders desiring to control everything within their sight.
So enjoy your slef-portrait porn, scanner-induced skin cancer, your breast/penis fondling by the SA, and the eventual limitations placed upon the internet/free speech. It's inevitable.
Re:It's about control not reality (Score:5, Funny)
And there's no real threat of me being blown by an airplane terrorist.
Well, no, I think nearly all airplane terrorists are men who don't swing that way. But it would be an interesting experience right before getting blown up.
Re: (Score:2)
"There's no real threat of cyberwar."
Um, citations, please.
And there's no real threat of me being blown by an airplane terrorist."
Same for me, but that's because I rarely fly nowadays.
"But that's completely irrelevant for government leaders desiring to control everything within their sight."
Their reactions would be the same if they were instead desiring to not to be in office when an attack was successful. Bonus points for thwarting attacks in a way that can be disclosed. More points if any of various ter
Re: (Score:1)
-1 Flamebait
Really? Which part?
Re: (Score:2)
You're right. There is no threat. Not right now, because the internet doesn't belong to anyone, hurting people on the internet would serve no military goal, bring down no installations or cause nuclear wars. But the moment, the internet becomes, state property or state regulated, like what the US is trying to do, then you get a whole slew of opportunities to explore.
People keep bringing up that Iran bit and their centrifuges, my question is this, why do they have an internet connection?
They were not connected to the internet, they were infected by USB drives.
Were their plans for nuclear bombs downloaded from the internet?
Do other countries do that? Does the US connect it's F-16s and drones to the internet, and send hourly tweets?
South Korea has semi autonomous internet enabled gun turrets in select banks to replace on site guards. Is that close enough?
Even if they need to communicate from one end of the country to another, wouldn't any military use it's own communications network?
If they don't, well, gamers have an expression for this: EPIC FAIL!
Re: (Score:2)
People keep bringing up that Iran bit and their centrifuges, my question is this, why do they have an internet connection?
Why do people still think that Stuxnet came in on an internet connection? There's been plenty of talk about this. Stuxnet is known to be able to infect UBS sticks. It's also possible that someone inserted it deliberately into some of the internal systems. Sure, we don't know details of Iran's IT infrastructure for its nuclear program, but given that a direct connection from your internal, "secure" industrial site to the whole outside world is colossally stupid and the worm had other ways to get in, why assu
Historical Contradiction (Score:4, Informative)
Perhaps they are unaware that the US and Israel have just recently made a computer attack against Iran, where there is no actual military confrontation.
Does targetted malware count? (Score:3, Informative)
No. (Score:1)
I guess they didn't read yesterday's new york times:
http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html [nytimes.com]
No.
So, who was actually hurt? Were there any casualties?
No one was hurt. Most Persian civilians went about their business. The Government had one of their projects set back. BFD.
Comparing that to war just dilutes what war really means just as much as the "War on Drugs", "War on Terrorism", and every other hyperbolic statement made by media, government and anyone else who has an agenda - like computer security people selling their services and wares.
Re: (Score:1)
No.
So, who was actually hurt? Were there any casualties?
No one was hurt. Most Persian civilians went about their business. The Government had one of their projects set back. BFD.
Comparing that to war just dilutes what war really means just as much as the "War on Drugs", "War on Terrorism", and every other hyperbolic statement made by media, government and anyone else who has an agenda - like computer security people selling their services and wares.
Are you requiring casualties and injuries in order to make the determination of war??
In fact, I think a clearer representation of what fuels the undertakings of war was
your one line:
"The Government had one of their projects set back."
Uh-huh... I think THAT is the purpose of war.
-AI
"can't really do much damge"? (Score:2)
sub-state actors such as terrorists and individual hackers can't really do much damage.
Considering the presence of many brands of botnets for hire, I'd strongly disagree with that. Anyone with the cash can launch a cyber-attack.
Or look at what "Anonymous" has been doing lately. Or are they a state now?
Re:"can't really do much damge"? (Score:5, Insightful)
I recently submitted [slashdot.org] a story to /. that is related to this very topic. Chief of defence staff in the UK, General Sir David Richards, argued a little while ago that the UK should have a cyber command [iiss.org], and that the UK faces what he called a 'horse verses tank moment' in coping with modern warfare, saying the the rules of war had changed as a result of the success of insurgents in Iraq/Afghanistan, and the threat of non-state actors. In particular, he said that 'We must learn to defend, delay, attack and manoeuvre in cyberspace, just as we might on the land, sea or air and all together at the same time. Future war will always include a cyber dimension and it could become the dominant form. At the moment we don't have a cyber command and I'm very keen we have one [google.com]. Whether we like it or not, cyber is going to be part of future warfare, just as tanks and aircraft are today. It's a cultural change. In the future I don't think state-to-state warfare will start in the way it did even 10 years ago. It will be cyber or banking attacks — that's how I'd conduct a war if I was running a belligerent state or a rebel movement. It's semi-anonymous, cheap and doesn't risk people.'"
Re: (Score:2)
I recently submitted [slashdot.org] a story to /. that is related to this very topic. Chief of defence staff in the UK, General Sir David Richards, argued a little while ago that the UK should have a cyber command [iiss.org], and that the UK faces what he called a 'horse verses tank moment' in coping with modern warfare, saying the the rules of war had changed as a result of the success of insurgents in Iraq/Afghanistan, and the threat of non-state actors. In particular, he said that 'We must learn to defend, delay, attack and manoeuvre in cyberspace, just as we might on the land, sea or air and all together at the same time. Future war will always include a cyber dimension and it could become the dominant form. At the moment we don't have a cyber command and I'm very keen we have one [google.com]. Whether we like it or not, cyber is going to be part of future warfare, just as tanks and aircraft are today. It's a cultural change. In the future I don't think state-to-state warfare will start in the way it did even 10 years ago. It will be cyber or banking attacks — that's how I'd conduct a war if I was running a belligerent state or a rebel movement. It's semi-anonymous, cheap and doesn't risk people.'"
I for one welcome our new bloodless cyber-war overlords. I think StarCraft 5 should be the medium mandated by the Seoul Conventions of 2025 and 2032.
Re: (Score:3)
Or look at what "Anonymous" has been doing lately.
Yes, let's look at that. What did Anonymous accomplish? They brought down a few websites for a couple of hours.
And most of their targets didn't actually need their websites to conduct business, so it barely affected them (PayPal was the big exception).
The real problem... (Score:5, Insightful)
"war" carries with it a strong series of historical associations, lessons learned, rules of thumb, rules, likelihoods, etc. Virtually none of them really map all that well into the area of computer security. If you use the term "cyberwar", though, you are implicitly trying to mash those (comfortingly familiar) concepts into a badly-fitting new environment. In a much less serious vein, this is why most movies that feature a "hacking" sequence usually make hacking look like beating a video game- because video games are "computery"; but they work very hard to simulate familiar rules.
Electronic attacks are a costly problem and, if some idiot connects the wrong control systems to the internet, or a laptop to the wrong control systems, potentially a dangerous one; but trying to map them into the historical concepts of "war" just doesn't work very well.
Re: (Score:1)
Re: (Score:2)
Spionage isn't war. The name is dumb.
You can use spionage in a war. But it is not the same as murdering lots of people.
Re:The real problem... (Score:4, Insightful)
It's really computer espionage and/or sabotage. Those have been parts of warfare for as long as there has been war.
Since the Internet lets you engage in espionage and sabotage with zero risk of being physically caught, it changes the dynamic to something we haven't seen before. But it's not completely unrelated to warfare as it's always been done. The real constant about it is the lack of constants, as the level of technology constantly increases and presents new opportunities to thwart or take advantage.
Re: (Score:1)
Is that the term "cyberwar" is pretty stupid. In fact, it isn't just stupid, it is so misleading(intentionally or otherwise) that letting it slip into your lexicon makes you dumber.
"war" carries with it a strong series of historical associations, lessons learned, rules of thumb, rules, likelihoods, etc.
Electronic attacks are a costly problem and, if some idiot connects the wrong control systems to the internet, or a laptop to the wrong control systems, potentially a dangerous one; but trying to map them into the historical concepts of "war" just doesn't work very well.
Ahh, I see. And by your determination, the bit of electronics I have in my pocket that
I make "telephone calls" with is thus, not a telephone because it doesn't have the
strong historical associations with MaBell's horkin large plastic behemoth that has
been hanging from my mom's kitchen wall for the past 40 years.
Got it!
-AI
Re:The real problem... (Score:4, Insightful)
Your old-school landline was associated with a place, in that its area code probably actually meant something, it was physically terminated in a given building(which, if a residence, quite likely had more occupants than phone lines). Also, billing may well have drawn a distinction between "local" and "long distance". It was further localized in that, unless specifically unlisted, it would be printed in the local telephone directory.
Your cellphone, by contrast, is more typically connected with a person. Odds are that its area code is nearly arbitrary, it is listed in no phone books, and its billing is flat at least within an entire country, if not more broadly. It is not at all uncommon for a household to have a cell per person, and, since there is no physical hookup, even people without addresses commonly have them.
There are also the broader social changes: social event organization certainly isn't the same if you can only call somebody when you are both in a building with a phone. Just ask an old person about the rise of the spontaneous "eh, we'll figure it out as we go and text you" model of social planning. That simply didn't work with the old material culture. Never mind the(less notable in the wealthy west; but dramatic among the poor here and abroad) change from "you basically can't get a line run and provisioned for less than $$ a month; but the calls cost essentially nothing" to "calls cost $/minute; but you can literally get a phone and some starter minutes at any corner store for 15-20bucks".
Also, of course, we have the fact that landline phones work very well as dumb extensions of the network. The older ones are even powered by it. Thus, the landline world has seen an almost complete dichotomy: phones, which have remained dumb as bricks, with the exception of message machines, and modem-connected computers, which are wholly free of telco control and treat the network as a dumb pipe. Cellphones, on the other hand, have to be pretty sophisticated devices just to work, so they started sprouting additional features early; but were always much more creatures of the carriers. Hence the continuing differences between the evolution of the "smartphone" and the evolution of internet-connected devices with their heritage in modem-linked PCs.
I don't wish to claim that yours is precisely analogous to "war" vs. "cyberwar"; but I would very much claim that it does demonstrate the sort of important changes that an apparently simple switch can hide. My contention would be that somebody trying to approach a "cyberwar" based on the "war" part would be roughly like somebody trying to use a bleeding-edge smartphone by looking things up in the phone book and attempting to rotary dial the touch screen.
Re: (Score:2)
There's an elephant in the living room. (Score:5, Insightful)
The cyberwar is already ON between state actors. Stuxnet, for instance. Certainly targeted at Iran, almost certainly developed by the US, Israel, or both. There's the attack on Google and other non-Chinese companies from China in 2009 as well.
IMO, now that Stuxnet has paved the way, we WILL see cyberterrorism directed at other SCADA systems.
Re: (Score:1)
The cyberwar is already ON between state actors.
Has been for years, amazing how many people have seen the NSA portrayed in TV and films but have not heard of INFOSEC.
Re: (Score:2, Insightful)
And that elephant is named "espionage." The only difference today is that the systems are more complex and interconnected. Otherwise, "cyber-war" is no different than the ongoing spying and sabotage that's been practiced for decades. Espionage was never it's own entity which is why "cyber-war" is misleading.
Re: (Score:2)
There's the attack on Google and other non-Chinese companies from China in 2009 as well.
Not to mention Titan Rain [time.com], from 2003.
In a Perfect World (Score:4, Insightful)
its probably safe to ignore... (Score:1)
I mean their example of what they consider cyberwar is the estonia thing, which pretty much means they couldn't have done much research considering the US and China have been battling it out for well over 10 years.
But beyond that, they're economics professors! Why do educated people try to convey messages about stuff they're not educated in? Isn't that how the whole 'thermite did 9/11' thing started? By not realizing that thermite is more or less a fancy word for 'finely crushed aluminum', sorta like what y
Only likely when already involved ? HA! (Score:4, Interesting)
Ho, that's rich! There is speculation that the U.S. and Israel are behind Stuxnet which is dedicated to screwing up Iran. And why not? Why wait until military action? In fact in this case if you can screw the Iran infrastructure up enough, you may not even need to have a military action against them.
Also a lot of this depends on your definition of cyberwar.
China is doing the smart thing right now by backing cyber attacks against the US infrastructure. Before engaging an opponent, it's good to know their weaknesses. The US government uses a lot of Microsoft products as does China now. (China bought shared source years ago). If I were the Chinese I would be setting up servers and hacking them down just to record things like recovery time, etc.
This ain't your daddy's cyberwar. It's all about probing and sizing up an opponent these days.
Almost everything in the News is "over-hyped" (Score:3, Insightful)
Since the news media likes to repeat the same thing over, and over, and over, just about anything that hits the national press is either over-hyped or about to be over-hyped. That's just the way it is. Cyberwar is no different.
Opiate (Score:2)
*cough* Stuxnet *cough* (Score:2)
Sorry, we already have a counterexample in Stuxnet: a highly enginnered, highly malicious 'cyber-warface' class attack, launched outside of open hostilities with the intended aim of destroying portions of the target's infrastructure.
Stuxnet has now said 'if you don't get caught, its open season'.
This is new. (Score:1)
There's a lot of money to be made in security... (Score:1)
Why the hell would states restrict usage? (Score:5, Insightful)
So what happens...? (Score:2)
Re: (Score:1)
new rule to add onto asimov's
Never connect a robot to the internet.
Re: (Score:1)
Some Robots already were connected to multivac. The difference probably relies on the fact that Multivac was run by the government.
If we could actually apply Asimov's 3 rules to computers and robots we'd probably be on the right track. :P
Cyber espionage (Score:3, Insightful)
Translation... (Score:3)
Nothing to see here, move along, your unsecured networks are perfectly safe as they stand.
NSAs cant do much damage? (Score:5, Insightful)
Do they mean like when, during the incident in Georgia, Russian hackers brought down the primary bank used by most Georgians for about a week? Look at what happened at 9/11. In physical terms, the damage was slight. A couple planes, a few buildings, and several thousand people gone. The actual act didn't really affect anything. It was the response generated by the attack-the fear, the anger-that prompted the stock market to drop, and the US to invade 2 countries. Terrorists do not care about physical damage, they go after symbolic targets that will create the most psychological damage. Say al-Qaeda brought down Bank of America's online systems for a few days. Economically it would not have much of an impact overall. However, it would shake people's confidence in the system, cause huge overreactions, and the damage would come not from the attack but from the response.
Consider this example: you want to attack the population of a walled city, and you have something that will make a water supply useless. What is going to have the bigger impact, poisoning the stream that runs by the walls, or poisoning the well in the middle of the town? With cyber attacks, a terrorist can essentially do this without ever having to set foot inside the walls. You want to really cause problems in the US and the rest of the West? You don't attack an embassy, or a military convoy. You don't even have to directly, physically attack the civilian populace. You simply attack their wallets. Make people worried that they can't get to their money, and you will have caused real problems.
Re: (Score:1)
Say al-Qaeda brought down Bank of America's online systems for a few days. Economically it would not have much of an impact overall.
It would not have much of an impact overall??? I guess that
means you bank with Well's Fargo or some other bank?
Cause, if B of A was down for a few days, I would be so
fucked it would be stupid.
I'm one of these that bought into the, don't carry cash anymore.
So, yeah, I don't. And if BofA went offline let's say yesterday
morning cause I did my shopping, got gas, etc in the evening...
I would be so completely fucked. I wouldn't have money in my
pockets, I wouldn't have food for me to eat or for my poor dog
If BofA
Anyone (Score:2)
Anyone who leaves their machines open to invasion deserve what they get. My machines are well protected and will never be &*^#&%^#&
Buy our H3RB4L V14GR4 [wikipedia.org]. Is the bestest availleable.
I've been saying this for years (Score:1)
Where's my check?
CyberWar CyberEspionage (Score:4, Insightful)
states are only likely to use cyberattacks against other states when already involved in military action against them
Well Stuxnet has already blown that theory. Network intrusions and system compromises are only part of the equation. Cyber espionage is alive and well and extremely prevalent. The only difference between a cyber-attack and cyber-espionage is whether you're just stealing valuable info or actively damaging things. China is only interested in acquiring technical knowledge at this point. Also by quietly exfiltrating data as they are, it makes it much harder to find out just how deep they are. If they start breaking things, their methods and access gets discovered. Better to be quiet and maintain access in case they want to turn malicious and actively disrupt things..
A couple of points (Score:3)
First, there are plenty of non-states that would like to, and indeed are this moment planning to, cause harm to the United States, its people, and other nations that are generally considered our allies. Even some that are not. This motivation has, in the past, been expressed by actions that are not those of a conventional military, nor of even fairly unconventional war. Trying to dismiss 'cyberwar' as something that is not likely because it would not be termed 'war' misses the point and wastes my time.
War by technical manipulation of the Internet, etc., would be damaging, and it is not inconceivable that it could cost lives directly and indirectly. This meets any definition of war that I'm interested in working with. Parsing the words will not change the outcomes, so let's stop that, ok?
And it should be obvious that adversaries that are not 'states' will certainly not be less motivated to do us harm by 'cyberwar' means just because such means don't involve massive visible, physical damage and attendant casualties. Indeed, many will see this as a method that can yield them substantial gains for what is limited exposure to retaliation.
I'm left thinking that not only do many Slashdotters buy into this 'no cyberwar threat' campaign, but that our leaders may. Discounting a new weapon is not a good military strategy. Perhaps we won't be using guns and bullets to fight this fight, but actually a well-placed explosive could isolate any number of cyberwar forces if they are limiting themselves to their home states. Needless to say, these combatants will be dispersing themselves to avoid being cut off, literally, from their battlefield. Finding them will be the challenge. Deflecting and mitigating the attacks will be needed, but finding the actual perpetrators will be a challenge. The question will be if this is necessary.
Re: (Score:1)
I'm left thinking that not only do many Slashdotters buy into this 'no cyberwar threat' campaign, but that our leaders may
Really? Last place in the world I would expect people to "not get it" /.'rs as a different animal,
would be here. Maybe I see my fellow
but I'd expect a full 90% here to be the rallying cry for "watch out".
And I'm just allowing 10% for the typical populous of naysayers.
-AI
Re: (Score:2)
Many here try to minimize the threat. I understand, but of course, there's the delusion thing...
Re: (Score:2)
What?
Re: (Score:2)
It took two cups of coffee (one half-caffeinated) to get this.
First, you're here, your a Slashdotter, even if you're an AC.
I spend time here for the same reason you do - the discussion. Even busy people do things, my friend, but wasting my time is the same whether I'm busy or not. The ad hominem attack has set the stage. Already you dislike me as much as you dislike my opinions. Nice.
Citations for damages and casualties from 'war by technical maipulation of the Internet' are plentiful, so long as we lim
My vision of Cyber War (Score:1)
A generalization... (Score:2)
Straighten up! (Score:1)
Maybe (Score:2)
Online fraud is not usually terroristic. I have no issue at all with that. But when the combined effect of online fraud is considered it places a huge economic burden on some nations. Sex sites are similar. By themselves those sites are harmless. But the combined effect is eating half of the net alive. The power use for sex sites alone is a burden on society. So to what degree do we know that foreign powers are involved in promoting such things with war like intentions?
When already involved in military action... (Score:2)
"A pair of British researchers have said states are only likely to use cyberattacks against other states when already involved in military action against them"
That is a ridiculously stupid assertion.
IANAG, and...
I haven't studied every war in history but I'm pretty sure they all
started when "another state" instigated military action. Now the
journalistic view of a war starting is a jet taking off or a tank rolling
into town. But it can just as easily be started by someone hitting the
ENTER key.
Best thing you c
Re: (Score:3)
Absolutely correct. Consider that one state wants resources that another state also desires and both are negotiating with a third state to secure them.
Now imagine that one of the states has the information and capability to disrupt the resources of both the supplier and it's competing state. It will gain a serious competative advantage in doing do right?
Warfare isn't just about shooting at people. Gains to the state can be made through many means. Through the barrel of a gun is just one of them. Electronic
The cyberwar will not be televised (Score:2)
Instead, you can catch it on alt.com