Results 1 to 20 of 52

Thread: Beijing’s Doctrine on the Conduct of “Irregular Forms of Warfare”

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member slapout9's Avatar
    Join Date
    Dec 2005
    Posts
    4,818

    Default

    Quote Originally Posted by JeffC View Post
    There's an unofficial sense among some AI researchers I know that the 8th Air Force is developing an electronic "scortched earth" cyber weapon that will flow through a distributed network, burning out each node. Of course, no one will admit it exists.


    I would say that they are developing a cyber weapon that will allow them to control the Network as opposed to burning it up. This is the part of EBO theory that is not talked about much. The ultimate goal is to control the enemies COG's (systems) instead of blowing them up and then having to pay for it. Its more like an electronic insurgency.
    Last edited by slapout9; 11-17-2007 at 03:09 PM. Reason: add stuff

  2. #2
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Most of the cyber effects based operations are fairly "secret". Though the DOD and the TLA's agencies all have substantial work being done on the subject. A lot of it comes from the opposite end of the spectrum in the enthusiast community. Academia has no interest and anything that could be considered offensive is just that. They sure do like the money though.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  3. #3
    Banned
    Join Date
    Jun 2007
    Location
    Poulsbo, WA
    Posts
    252

    Default

    Quote Originally Posted by selil View Post
    Most of the cyber effects based operations are fairly "secret". Though the DOD and the TLA's agencies all have substantial work being done on the subject. A lot of it comes from the opposite end of the spectrum in the enthusiast community. Academia has no interest and anything that could be considered offensive is just that. They sure do like the money though.
    And it's not really all that practical. If it exists, it's probably one of those things that you want to have but not use. Today, with the ability to hide and control Bots inside networks, why destroy anything? All you need is a laptop and access to the network.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •