Results 1 to 20 of 209

Thread: Is Cyber a new warfare? Debate (catch all)

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    Dave said this on his mailing list, & I thought it was pretty good although his examples weren't quite as hot. I wanted to pass it on because when I read it I thought of you rogues.

    So what is a weapon of mass disruption? I would say one feature of Cyber is that it DIRECTLY attacks things that can only be indirectly attacked by other measures.
    I'd use Stuxnet as an example of that, & then in something of a narrative slide, the HB Gary hacks, & then Dave's examples:
    One, easy to see example, is political parties. Obama's campaign got hacked in 2008. Palin's mailspools leaked in 2008. No one seemed to care about either other than for the lulz..
    The Stuxnet hacks were semi-kinetic, which is why I think they're a useful example.
    Last edited by davidbfpo; 06-03-2011 at 09:36 AM. Reason: fix quotes and Mod fixes quotes!

  2. #2
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Quote Originally Posted by anonamatic View Post
    Dave said this on his mailing list, & I thought it was pretty good although his examples weren't quite as hot. I wanted to pass it on because when I read it I thought of you rogues.



    I'd use Stuxnet as an example of that, & then in something of a narrative slide, the HB Gary hacks, & then Dave's examples:

    The Stuxnet hacks were semi-kinetic, which is why I think they're a useful example.
    Solar Sunrise is a great example of mass disruption of a nation state by a hacker. See the youtube video for how to stop a war.

    The best kinetic example I know of to date is the 1982 is the Russian pipeline explosion was purposeful software exploitation.

    That's one of the issues with network centric views of cyber. It ignores vast areas of cyberspace and the techno centric societies vulnerabilities. Up-supply-chain hacking is just now getting press or noticed. Yet it is a perfectly valid (and validated) method of attacking technology.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

Similar Threads

  1. USAF Cyber Command (catch all)
    By selil in forum Media, Information & Cyber Warriors
    Replies: 150
    Last Post: 03-15-2011, 09:50 PM
  2. Information Operations
    By SWJED in forum Media, Information & Cyber Warriors
    Replies: 152
    Last Post: 08-28-2009, 09:47 AM
  3. A Few Cyber Warfare Resources
    By JeffC in forum Media, Information & Cyber Warriors
    Replies: 10
    Last Post: 12-18-2007, 02:01 PM
  4. Recognizing and Understanding Revolutionary Change in Warfare
    By SWJED in forum Futurists & Theorists
    Replies: 0
    Last Post: 03-01-2006, 09:59 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •