How the Code War Has Replaced the Cold War 79
An anonymous reader writes "After years on the defensive, governments are building their own offensive capabilities to deliver digital attacks against their enemies. It's all part of a secret arms race, where countries spend billions of dollars to create stockpiles of digital weapons and zero-day flaws. But is this making us any safer, or putting us and the internet at risk? 'Estonia is a small state with a population of just 1.3 million. However, it has a highly-developed online infrastructure, having invested heavily in e-government services, digital ID cards, and online banking. ... The attacks on Estonia were a turning point, proving that a digital bombardment could be used not just to derail a company or a website, but to attack a country. Since then, many nations have been scrambling to improve their digital defenses -- and their digital weapons. While the attacks on Estonia used relatively simple tools against a small target, bigger weapons are being built to take on some of the mightiest of targets.'"
Re:Two words : (Score:2, Informative)
Only if done properly. If you allow your people to insert random storage devices between the systems then you are still vulnerable. One example using the mistakes made in the separation is Stuxnet.
Re:Lots of challenges in dealing with this (Score:0, Informative)
China sure did a number on the US solar industry, "liberating" mask info, then selling panels for cheaper than the cost of the rare earths. So, if it were a false flag operation, it would mean a lot of Chinese companies and ships magically had those panels coming to US shores from factories out of nowhere.
Re:Lots of challenges in dealing with this (Score:2, Informative)
http://lmgtfy.com/?q=solar+pan... [lmgtfy.com]