How the Code War Has Replaced the Cold War 79
An anonymous reader writes "After years on the defensive, governments are building their own offensive capabilities to deliver digital attacks against their enemies. It's all part of a secret arms race, where countries spend billions of dollars to create stockpiles of digital weapons and zero-day flaws. But is this making us any safer, or putting us and the internet at risk? 'Estonia is a small state with a population of just 1.3 million. However, it has a highly-developed online infrastructure, having invested heavily in e-government services, digital ID cards, and online banking. ... The attacks on Estonia were a turning point, proving that a digital bombardment could be used not just to derail a company or a website, but to attack a country. Since then, many nations have been scrambling to improve their digital defenses -- and their digital weapons. While the attacks on Estonia used relatively simple tools against a small target, bigger weapons are being built to take on some of the mightiest of targets.'"
Re: (Score:2)
So do I.
Let me know when it happens, will you?
Re: (Score:2)
exactly I want my Hoverboard, flying car, and FTL drive.
Lots of challenges in dealing with this (Score:5, Insightful)
Since they seem destined to exist I hope that the cyber weapons being built have adequate safeguards against their misuse or accidental use.
Cyber warfare is worse than submarine warfare in terms of being able to identify an attacker. It provides the means for potentially anonymous devastating attacks. How will the world react to that?
Cyber arms control will be difficult to achieve, at best, maybe impossible.
Will a "Cyber Geneva Convention" be needed? No attacking hospitals, etc.?
How will organized crime and black hats fit into this framework? Will they be in the new era what pirates were in the 1700s - 1800s?
Re: Lots of challenges in dealing with this (Score:2)
Re: (Score:2, Insightful)
Anonymous attacks? The even worse part is that it is possible to make it look like it was someone else that started the attack by going via insecure third-party systems and covering your tracks.
But sure, we can trust the reports stating that China is one of the major cyber war actors. Despite them having insecure systems and anonymous hosting that anyone in the world can abuse....
Re: (Score:2)
Re: (Score:2, Informative)
http://lmgtfy.com/?q=solar+pan... [lmgtfy.com]
Re: (Score:1)
Re:Lots of challenges in dealing with this (Score:4, Funny)
That's always been possible, even with conventional attacks.
For example, The Mossad & 9-!! ,$@#
no carrier
Re: (Score:1)
Safeguards ? Like an Evil bit flag parser on my shellcode ?
Re: (Score:2)
I can't tell whether you're being serious or sarcastic.
Re: (Score:3, Interesting)
How does mass surveillance of private communications prevent DDOS attacks?
Blackhats are on the same "side" from the perspective of the innocent people they are attacking, even when they fight against each other.
Re: (Score:3, Interesting)
Re:Have we been hurt in this "war"? (Score:4, Insightful)
This.
This isn't a war between Us and Them where we race to break each other's stuff.
This is a war between people who would like to use computers to build nifty stuff to make people's lives better, and people who would like to break other people's computers to advance their political agendas.
Re: (Score:2)
How much (if any) does this negate his whistleblowing about domestic surveillance?
Not at all, just because something immoral is being done for a strategic military reason does not make it more moral.
Re: (Score:2, Informative)
Only if done properly. If you allow your people to insert random storage devices between the systems then you are still vulnerable. One example using the mistakes made in the separation is Stuxnet.
Re: (Score:3)
Only if done properly.
Sure, but this applies to every engineering solution ever, no?
If Goverment and Industry (Score:2)
wasn't so downright negligent in their race to adopt new technology, most of the problem would not exist.
Re:If Goverment and Industry (Score:4, Insightful)
It isn't adopting new technology, it is doing so focusing being as cheap as possible in the short term, and damn the long run.
In reality, I see at least six things that, had it been implemented earlier, would have saved us a lot of issues:
1: The concept of tainted instructions and having anything a Web browser grab be viewed as potentially hostile. This means add-ons are restricted to a sub-context and only can get keyboard input if they have the focus (and they have to be clicked on to have that happen), and the OS the Web browser sits on not just isolate its processes in memory, but also the file system. This way, there isn't an undocumented API a compromised browser or add-on could use to expand its context.
2: Moronic things like the USB protocol where a disk drive can present itself as a keyboard. It would be nice to have specific USB ports where only drives can register in one set, keyboards in another set, and so on.
3: The almighty firewall as the answer to all remote hacking. This worked when hacks were incoming, but now with the primary means of attack holes in Web browsers, the focus needs to be on add-ons and the browser, then defense in depth.
4: Backups got set aside. It wasn't that long ago when every serious PC had a tape drive with it because hard disks died, and tape was cheap, and worked well. Now that people think they can back up to hard disks (note, none I know of are archival grade), it is a matter of course to lose data.
5: Trusting other people with security. When people stopped packing their own parachutes, the shit hit the fan. If one wants to store stuff with an offshore provider, great. Just encrypt the damn files before they leave the site.
6: Final one... no security specs or audits whatsoever except for the US Government's FISMA compliance that can have random audits happen. Only time an audit happens in a lot of private companies is after a breach happens.
Re: (Score:2, Insightful)
7. Equating a running process with a user and assigning privilege accordingly - this is a massive fail. It was relevant back in the day when researchers logged on to shared systems and ran programs they had written themselves. It assumes a complete knowledge of the program to be run, which has not been the case for 30 years, but is still the standard level of trust.
Re: (Score:2)
Billions of dollars? (Score:5, Interesting)
Stockpiles of exploits? Sounds like some reporter is out of his/her depth and can't understand the difference between physical weapon stockpiles and software vulnerabilities. Welcome to the new Yellow Journalism. FUD, FUD and more FUD.
Re:Billions of dollars? (Score:4, Insightful)
I fail to see the problem with his choice of words, you find exploits and put them in an arsenal of attacks. Just because you count number of exploits and not numbers of guns it's still an accumulation of weapons set aside for future use in cyber-warfare. And of course it costs lots of money to maintain such an arsenal as old exploits are patched or the vulnerable software or hardware goes out of use, it doesn't have a shelf life like physical weapons but your capability degrades over time unless you supply it with new exploits not entirely unlike when your enemies upgrade their weapons capabilities making yours obsolete. At least it's no worse of an abuse than using "cyber warfare" for sending bits and bytes instead of bullets at each other.
Re: (Score:2)
Re: (Score:2)
Then those apps and services would run really, really slowly.
(Yes, I know Java can be made to not suck, but every .NET program I've had to deal with has been clunky.)
you trade a preventable class of vuln for more (Score:2)
Buffer overflows are one important class of vulnerability. They are also fairly easy to prevent /detect in new code. Use strncpy, not strcpy, etc. Static analysis can flag the dangerous constructs 99.9% of the time.
Java and C# are vulnerable to other, less readily identified vulnerabilities because key parts of the operations are hidden in the libraries and programmers are not accustomed to thinking about them. Both can easily have vulnerablities from memory management problems, but they can be harder to
Estonia has 1.3 million.... (Score:3)
Joke of a comparison (Score:5, Insightful)
Re: (Score:3, Insightful)
Technically speaking, most of those nuclear weapons everyone was afraid of back then are still there, just waiting to be fired. Now, rather than the Soviet Union, they're in the hands of Russia. A least nothing is going on that might increase tensions between Russia and the rest of the world right? Oh, and fortunately Russia isn't run by some hard-right authoritarian, obsessesed with projecting strength.
Re:Joke of a comparison (Score:5, Interesting)
Technically speaking, most of those nuclear weapons everyone was afraid of back then are still there, just waiting to be fired. Now, rather than the Soviet Union, they're in the hands of Russia. A least nothing is going on that might increase tensions between Russia and the rest of the world right? Oh, and fortunately Russia isn't run by some hard-right authoritarian, obsessesed with projecting strength.
The Soviet Union with half of Europe as allies was a superpower. Russia is barely in the top 10 biggest economies of the world, they have 140 million men against 900 million in NATO. Their military technology and spending suffered during the reforms, by all means they're powerful but they got no chance of pulling off a victory. Putin is gambling that nobody wants to pick a fight with Russia over a few areas in Ukraine, if he's called on it they'd lose but probably not before a hundred million people have died. Unless of course China were to join on the Russian side, 1.35 billion people and the world's second biggest economy along with Russia's nukes would give NATO a real run for their money. Personally I think what's happening in Ukraine will push all the other countries in the "buffer zone" between NATO and Russia to seek NATO membership over Russia's objections.
Re: (Score:2)
Russia still has the nuclear weapons that had everyone scared of nuclear annihilation back in the day. Well, technically the US has most of the nuclear weapons that had everyone scared of nuclear annihilation back in the day, but Russia still has its share.
Re: (Score:2)
Re: (Score:2)
John Kerry said diplomacy was simpler then than it is today - considering his experience as a soldier and a prominent protestor in the Cold War, and now as a top diplomat, he might know what he's talking about.
Re:Joke of a comparison (Score:4, Interesting)
Re: (Score:2)
good (Score:4, Funny)
Instead of global thermonuclear war, we now have to worry about WoW going down. Seems like a good tradeoff to me.
Re:good (Score:5, Insightful)
Instead of global thermonuclear war, we now have to worry about WoW going down. Seems like a good tradeoff to me.
Instead of WoW, worry about the national infrastructure. Imagine all the SCADA devices insecurely connected to the Internet going down more-or-less simultaneously. No electricity, natural gas, or water distribution systems, no sewage treatment, etc. After a few hours/days without electricity the backup systems would start dying, so no phones or Internet either.
So no WoW, as you pointed out. But that would be the least of our problems :)
Re: (Score:3)
The SCADA systems are hundreds of thousands of different platforms/version combinations. Many of them aren't even connected to the Internet, many are based on firmware. Most are easy to secure and restore if they get corrupted/attacked.
"Cyberwarfare" really is a misnomer. In regular warfare, bombs and guns don't have compatibility problems, you permanently destroy infrastructure or occupy it, and you kill people trying to restore it; in "cyberwarfare", the attacks only work against compatible hardware/softw
Re: (Score:2)
An easier target would be the banking and government systems. Just screwing up social security transfers would be effective if slower.
Imagine 9/11, but with no radio or phone. Gradual (Score:2)
Imagine a 9/11 style attack, or a "poison gas in the subway", but at the same time they take out both the cell phone network and the most important radio trunking system used by first responders. The next day, the bad guys trigger the New York blackout.
Or, think back to how the US won the cold war - slowly, gradually, by economically outperforming the Soviets. The US is already the target of sustained, large scale attacks. If those attacks improve to the point that it costs 1%-3% of GDP in defense or dama
I know a lot of Russian programmers... (Score:4, Insightful)
... and let me tell you, if Cyber War replaces Cold War, they are winning this time...
An interesting question for any country (Score:1)
Is the army protecting us from this?
I.e. in the advent of a cyberwar will our army do anything to protect private infrastructure like the electricity supply or the banking system from harm?
Right now: No.
The book to read on this is "Cyber War: The Next Threat to National Security and What to Do About It" by Richard A. Clarke. A great read and very scary.
And this is why... (Score:1)
... mission-critical things like banking and providing essential government services should "play it conservatively" and not be at the forefront of technology.
OR, where it makes sense for them to be at the forefront, the "old way of doing things" should be kept around until after the "new" way has proven it is robust enough for the task.
Being "robust enough for the task" means, among other things, not having unacceptable levels of downtime under normal or abnormal-but-common conditions (such as DDOS attacks
Code war defined (Score:1)
Code war: What the US and the Soviet Union had during the nasopharyngitis [wikipedia.org] outbreaks of the 1950s through the 1980s.
Must everything be "online"? (Score:1)