Results 1 to 20 of 66

Thread: Anonymous attacks (Catch All)

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Banned
    Join Date
    Mar 2010
    Location
    Durban, South Africa
    Posts
    3,902

    Default

    Quote Originally Posted by Dayuhan View Post
    Minor clarification...

    Certainly nobody's going to fire off missiles in retaliation for cyber espionage, any more than they would in retaliation for conventional espionage. Of course the US is doing the same thing to China, but the Chinese don't howl to the press when they find out about it.

    Everybody spies on everybody else, with whatever tools are available. This is nothing new.
    Of course you, I and the Chinese know that there is no chance of US military retaliation in response to a cyber attack.

    Now all that remains is to make sure that these idiot "spokesmen" keep their damn mouths closed.

  2. #2
    Council Member Dayuhan's Avatar
    Join Date
    May 2009
    Location
    Latitude 17° 5' 11N, Longitude 120° 54' 24E, altitude 1499m. Right where I want to be.
    Posts
    3,137

    Default

    Quote Originally Posted by JMA View Post
    Of course you, I and the Chinese know that there is no chance of US military retaliation in response to a cyber attack.

    Now all that remains is to make sure that these idiot "spokesmen" keep their damn mouths closed.
    I don't know what the US response to a cyber attack that "causes the equivalent loss of life or damage to infrastructure as a conventional military attack" would be. I'm not even sure that a cyber attack can do that kind of damage, outside the realm of theory. I also doubt that we'll have a chance to find out, as there'd be little advantage to anyone in such an attack.

  3. #3
    Banned
    Join Date
    Mar 2010
    Location
    Durban, South Africa
    Posts
    3,902

    Default

    Quote Originally Posted by Dayuhan View Post
    I don't know what the US response to a cyber attack that "causes the equivalent loss of life or damage to infrastructure as a conventional military attack" would be. I'm not even sure that a cyber attack can do that kind of damage, outside the realm of theory. I also doubt that we'll have a chance to find out, as there'd be little advantage to anyone in such an attack.
    Yes that is wide enough a description with enough wriggle room to never have to react militarily. Phew.

  4. #4
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    Quote Originally Posted by Dayuhan View Post
    I don't know what the US response to a cyber attack that "causes the equivalent loss of life or damage to infrastructure as a conventional military attack" would be. 1) I'm not even sure that a cyber attack can do that kind of damage, outside the realm of theory. 2) I also doubt that we'll have a chance to find out, as there'd be little advantage to anyone in such an attack.
    1. Then you're not being very imaginative : combined or alone - shut down a nuclear power plant's cooling process, turn off the electrical grid during a blizzard, open sluice gates on dams during a flood, etc, ad naseum.

    eg, from Pg 15
    http://www.nps.edu/Academics/Centers...t_dynamics.pdf
    By the hacker’s own assessment, the disagreement over tactics was in part based on a different approach to conceptualizing problems. When the group was discussing attacking oil pipelines, everyone, including the hacker, talked about bombing it. But the hacker moved from this approach to discussing the pipeline as an information system (cf. pp. 58 and 59). It could be shutdown, he proposed, by attacking its control system. This suggestion was not taken up by the other practitioners, evidence to the hacker that they did not see that the world was really composed of systems and networks and that understanding these was essential.18
    This is from 2004 -
    Figure 3: Historical examples of successful cyber attacks
    In the open source realm, documented accounts of cyber attacks have been plentiful in light of
    the security danger such reports pose. There have been many serious instances of cyber attacks
    causing SCADA499 systems and other computer networks to malfunction as a result of accidental
    or targeted and malicious intent. The summary below, presented by category, details incidents of
    recent attacks against and disruptions of critical infrastructure and sensitive computer networks.
    Air and Ground Transportation
    In January of 2003, Continental Airlines based in Newark, NJ was forced to ground flights due to
    system inoperability caused by the SQL “Slammer” virus.500
    Banking Systems
    In January of 2003, Bank of America had 13,000 ATM machines rendered inoperable due to the
    SQL “Slammer” virus.501
    Dams and Waterways
    A well-documented and oft-quoted incident refers to a known case in 1998 when a 12-year old
    hacker broke into the computer system controlling Arizona’s Roosevelt Dam’s floodgates.
    According to sources, the hacker had complete control of the command SCADA system for the
    dam and could have flooded the city of Phoenix.502
    Another well documented incident refers to the April 23, 2000 arrest of Vitek Boden, a man who
    successfully intruded into a Queensland, Australia wastewater management system 46 times. For
    two months, the attacks were a mystery to investigators as Boden dumped hundreds of thousands
    of gallons of waste into parks, rivers, and commercial properties.
    http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf
    2. Little advantage to an active opponent of the United States, other than the whole point of causing mass casualties to an enemy.
    Last edited by AdamG; 06-03-2011 at 11:43 AM.
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

Similar Threads

  1. Pakistani people OK with drone attacks?
    By BayonetBrant in forum South Asia
    Replies: 12
    Last Post: 11-03-2012, 04:18 PM
  2. Social Media and Unconventional Warfare
    By Bill Moore in forum Doctrine & TTPs
    Replies: 38
    Last Post: 09-21-2012, 12:39 PM
  3. The Threat from Swarm Attacks (catch all)
    By davidbfpo in forum Doctrine & TTPs
    Replies: 4
    Last Post: 08-07-2012, 11:42 AM
  4. Attacks in Iraq Down Considerably
    By SWJED in forum Blog Watch
    Replies: 1
    Last Post: 01-23-2006, 10:33 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •