• Lucid Dreaming - Dream Views




    Results 1 to 5 of 5
    Like Tree1Likes
    • 1 Post By Original Poster

    Thread: Unleashing the Dogs of Cyberwar

    1. #1
      Member Achievements:
      Made Friends on DV Veteran First Class 5000 Hall Points

      Join Date
      Jun 2010
      Gender
      Posts
      709
      Likes
      348

      Unleashing the Dogs of Cyberwar

      Gone Missing: The Public Policy Debate on Unleashing the Dogs of Cyberwar
      POSTED BY: ROBERT N. CHARETTE / MON, JUNE 04, 2012

      For quite some time—and again over the weekend—U.S. government officials have been warning U.S. businesses to shore up their cyberdefenses. Without a hint of irony, the U.S. Department of Homeland Security (DHS) issued an alert to businesses about “Flame,” the Washington Post reported, even though it’s likely that Flame (as well as Stuxnet) is the result of U.S. and Israeli cyberwarfare cooperation.

      Over the weekend, Israel admitted publicly for the first time to engaging in “cyber activity consistently and relentlessly” for the purposes of "thwarting and disrupting enemy projects,” according to a story in the Sydney Morning Herald.

      Last week's revelation that the U.S. government long ago decided that launching cyber-attacks against countries it views as a threat is a legitimate foreign policy tool is now leading to the inevitable question of whether this behavior will serve as an open invitation to others to do the same. In an article at ComputerWorld, for example, this question was raised by several security experts. They argue that the United States, having kicked off its cover of plausible deniability, has “painted a huge target on [its] back.” They add that the admission also undermines any complaints the U.S. has against others, especially China, for conducting cyber operations against U.S. businesses or government organizations.

      The revelation has also raised questions regarding exactly what is the U.S. policy in regard to cyberwarfare. David Sanger, the journalist who broke the story of U.S. involvement in a coordinated program of cyberattacks against Iran that fell under the moniker “Olympic Games,” wrote in a Saturday New York Times article that US government officials:

      “’… approached the Iran issue very, very pragmatically,’ one official involved in the discussions over Olympic Games told me. No one, he said, ‘wanted to engage, at least not yet, in the much deeper, broader debate about the criteria for when we use these kinds of weapons and what message it sends to the rest of the world.’”

      This failure to think through all of the consequences of employing cyberwarfare parallels the lack of analysis preceding the initial deployment of armed drones to (and against) other countries, a move which continues to create major political as well as legal debate today.

      While a Washington Post editorial yesterday noted that the U.S. “lives in a mammoth glass house and ought to be mindful of the dangers when we throw stones,” the time for counting up the cost of its actions looks long past. The U.S. cannot complain if it begins to reap what it has sowed.

      And heralding what may be in store, there was an article today in the Washington Post about the search engine Shodan, which is able “to map and capture the specifications of everything from desktop computers to network printers to Web servers.” Users of Shodan, the Post said, were able to find that “uncounted numbers of industrial control computers, the systems that automate such things as water plants and power grids, were linked in[to the Internet], and in some cases they were wide open to exploitation by even moderately talented hackers.”

      So far, over 100 million devices have been discovered using Shodan, which has aided in “recording their exact locations and the software systems that run them.”

      It doesn’t take too much imagination to think what a government intent on doing harm to U.S. infrastructural and business systems could do with that information.

      (By the way, the Washington Post story on Shodan is the second part of a very well-worth-the-read multi-part series of articles on cyber security. Part one was on the anatomy of creating a zero-day attack.)

      One final consideration is whether all this will lead to even a greater push by the U.S government for the sharing of certain cyberthreat intelligence among the intelligence community and cybersecurity entities, as called for in the proposed Cyber Intelligence Sharing and Protection Act. My bet, given past history, is most definitely.
      source


      Would you be willing to give up basic freedoms and privacy to protect your country?

    2. #2
      Member Achievements:
      Made Friends on DV Veteran First Class 5000 Hall Points

      Join Date
      Jun 2010
      Gender
      Posts
      709
      Likes
      348

    3. #3
      Member Achievements:
      Made lots of Friends on DV Created Dream Journal Tagger Second Class Populated Wall 1000 Hall Points Veteran Second Class
      dutchraptor's Avatar
      Join Date
      May 2012
      LD Count
      0 since my last
      Gender
      Location
      Tranquility
      Posts
      2,913
      Likes
      3042
      DJ Entries
      6
      Quote Originally Posted by Phion View Post
      Would you be willing to give up basic freedoms and privacy to protect your country?
      This is only the tip of the iceberg. Without a doubt the government has every capability to hack into your computer or home if they want. Nothing new about this.

    4. #4
      Wololo Achievements:
      Created Dream Journal Tagger Second Class 1000 Hall Points Made lots of Friends on DV Populated Wall Referrer Bronze Veteran First Class
      Supernova's Avatar
      Join Date
      Jul 2009
      LD Count
      Gender
      Location
      Spiral out, keep going.
      Posts
      2,909
      Likes
      908
      DJ Entries
      10
      I just listened to a story on NPR last night, about how the US used a worm to destroy centrifuges in a nuclear laboratory in Iran (how they dropped the worm onto the computers controlling them is anyone's guess, but amusingly an engineer at the facility unwittingly infected his laptop, from which the worm spread across the world (unknown to anyone because it was specifically designed to attack centrifuge controllers)).

    5. #5
      D.V. Editor-in-Chief Original Poster's Avatar
      Join Date
      Jun 2006
      LD Count
      Lucid Now
      Gender
      Location
      3D
      Posts
      8,263
      Likes
      4140
      DJ Entries
      11
      I just can't wait for robotic eyes so I can haxor them and make myself invisible
      dutchraptor likes this.

      Everything works out in the end, sometimes even badly.


    Similar Threads

    1. What happens when engineers own dogs
      By The Cusp in forum The Lounge
      Replies: 2
      Last Post: 04-15-2010, 06:18 AM
    2. Tell me about dogs
      By Zhaylin in forum Ask/Tell Me About
      Replies: 12
      Last Post: 09-16-2009, 02:55 PM
    3. Dogs
      By skyS in forum Dream Interpretation
      Replies: 0
      Last Post: 10-25-2007, 03:32 AM
    4. My Dogs saw me OOB ;-)
      By Clairity in forum Beyond Dreaming
      Replies: 15
      Last Post: 03-08-2005, 05:12 PM

    Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •