Results 1 to 20 of 119

Thread: How do you change the perception?

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #14
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default

    "You said in an earlier post that you had engaged in cyber-attacks which would be a direct violation of federal law."
    I've gone out of my way to confirm we do not engage in illegal activities, ie hacking, and certainly have not violated any federal laws,
    Thats quite a threating accusation.

    Please provide quotes, I don't want any misunderstandings.
    Or unnecessary investigations, based on a mis-communication.

    Maybe its a misunderstanding of term "cyber attack".
    I'd like to clear this up. thanks for checking it out. Others may have taken it that way too.

    Don't remember saying that, certainly didn't mean it in that context..
    Now I'll read the rest of your post.
    Quote Originally Posted by selil View Post
    Bill, some discontinuous dissonance as a mirror to rambling rebellion.

    The thing is we do have a communications and computer systems agency for dealing with hostile attacks. That is the mission of the NSA along with all other forms of signals intelligence. Second the United States as a land of law has treaties that say we will not attack other nations. You said in an earlier post that you had engaged in cyber-attacks which would be a direct violation of federal law. NO , NOT: The Air force is standing up a cyber warfare command which will be interesting for a bunch of other reasons.

    Currently hacktivism and petty graffiti attacks are the primary "hacks" that occur. With the exception of a few different attacks like "Titan Rain" and high profile spy ware break outs.

    You totally missed the metaphor of ubiquitous communications and commodity computing as a "utility" making it air or water rather than "special". You need C4IT like you need anything else like food. C4IT makes you a better warrior but it isn't the only battlefield or tool. When you realize the Internet exists beyond the http, ftp, protocols and you dig deeper (i'm not talking dark net) the vista of the Internet takes on a deeper and broader view.
    I agree.
    How is a predator drone controlled?
    What gives a jdam the high accuracy that it known for?
    What provides the telemetry for a cruise missile?
    How are operational orders transmitted between general staffs and unit commands?

    There are only three forms of attack possible (plus two but that is another story) over networks and computer mediated environments.

    Please define these three, for clarity.

    You'll have to start defining your terms better here.

    A point as to etiquette as a user of THIS web forum I'm interested in using THIS web forum. Provide a link in your signature to your blog but stop trying to send us off to your website.

    The links are for additional info and shorten some of my already long and rambling posts.

    I'm not interested in having my IP harvested, my click through behavior analyzed, or my interactions and interests monitored.

    I WOULD SUGGEST A PROXY, TO PROTECT YOUR PRIVACY.

    Further posting large volumes of information from another BLOG here on another forum without permission from the owners of SWC/SWJ is bad news. You are fairly anonymous (your introduction left a lot to be desired) and with anonymity comes distrust. For all I know you are just violating intellectual property laws (good taste at least) and posting somebody else's blog information here as part of some IW campaign.

    With the anonymity comes some security, abet limited, and your right one should not trust anyone you 'meet' on the web, I'm just asking for consideration of my concepts and feedback. If your concerned you can email the Internet Anthropologist Blog and confirm for your self my permissions, if your so inclined.
    contact email is listed as barb.andrews at gmail.com
    And thanks for looking out for us.

    In any regards I think you're mixing information warfare and cyber warfare. If you start reading something like "In Athena's camp: Preparing for conflict in the information age. (1997). Santa Monica, CA: RAND." and the updated "Networks and netwars: The future of terror, crime, and militancy. (2001). Santa Monica, CA: RAND"that will take you down the information warfare and network centric warfare path you seem to be going. This is more akin to information operations than it is to tactical use of a computer for attack.

    I'll read them, thanks

    Just as a simple example information warfare is about message, and controlling the communication channel. In my laboratory cyber warfare (sic) is about destroying your capability to communicate, intercepting your command and control information, or changing your message without you knowing that we've done so.

    These are more in the realm of official government actions and Generally not appropriate for civilian ops.

    Those are simplistic examples of the confidentiality, integrity, availability triad which you can read more about from "Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001). A Model for Information Assurance: An Integrated Approach. Paper presented at the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY.".

    Thanks

    Think about defining your terms a little better within the context of your statements. Within this area of research the disciplines jargon is not fully understood. I agree.
    Bill
    Congrads on your DHS Fellowship, its nice to have an Expert around.

    .
    Last edited by Jedburgh; 01-09-2008 at 11:57 AM.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •