Pentagon Cyber Wars 109
Doctor Arcane sent us a link to an ABC Article on Cyber Warfare.
Talks about crack attempts on the pentagon and the likes.
Cyberwarfare may be the stupidest name I've ever heard of,
but it probably does represent the first steps in how war
will work in the future. Does it creep you out as much as
it does me? [ Speaking of creeping out: I'm flying home
today. I'm absolutely exhausted:physically, mentally, and emotionally.
but I do have an official IBM-Blue Part-of-the-Hive t-shirt
hand delivered by an elite cadre from the collective to show
for my week. Next year I want that thinkpad *grin*.
But I'm airborne today, so hold off ont he mail please
pretty please until tomorrow. Can't wait to get back to a normal
schedule after all the craziness ]
wait until tomorrow ]
Brackets (Score:1)
Oh, and I worked for a private company this summer that did work for the military (made plane parts and stuff). Security is tight. Like, all classified information is on computers on a seperate network which is enclosed in a pressurized pipe system. You can't get to the network without changing the pressure and shutting down the network. All the computer rooms are metal lined to prevent eavesdropping.
I can't imagine that important stuff at the pentagon is any less secure. If you do crack into the pentagon from the internet you're probably not going to find much except personal emails from some secretary or some insecure scripts the webmaster uses. I seriously doubt that you're going to find top secret military documents or alien invasion plans.
Mmmm Plane (Score:1)
cyberwarfare? (Score:1)
So, therefore, "cyberwarfare" means "war between governments" or "government-sponsored war" or something to that effect. Isn't nearly all war between and sponsored by governments?
Disagree. (Score:1)
However, I agree that "hacker" is not a synonym for "person who breaks into systems." Some of those people may in fact be hackers, while a large majority of they would be what I call either "script kiddies" or "hax0r d00ds."
So, where this article uses "hacker," they may or may not be correct. The people they refer to may very well be hackers, but they just as easily might not be.
However, "crackers" is not the appropriate terminology, since crackers refers to the talented asm coders who remove copy protection schemes from software.
William Gibson (Score:1)
keep in mind (Score:1)
keep in mind that while this article states a "percieved" threat on a, for the most part, secure system doesn't mean that there aren't similar threats abounding.
true story:
during the gulf war a group of scandanavian hacker-type people offered to crash the US Military communications network in the ME for several million dollars. saddam, the brawny idiot he is, declined the offer.
afterwards US analysts came to the conclusion that the hackers could have crashed our military networks and it was a very real threat in the future. i'm not saying that it would have caused iraq to win the war, i don't think they stood much of a chance personally, but such an attack on our military communications networks abroad could seriously fuck up our shit and cause a lot of problems. as our networks going down during key moments in the gulf war could have suddenly made our war over in iraq a lot more complicated.
sorry about the sketchy details, i read about it in time magazine a long time ago (uh...like after the gulf war...).
anyway the point is that there is a threat, but no so much a threat on the pentagon's secret shit.
Yuck (Score:1)
I had the pleasure of installing an ip logger this week and found myself being port scanned by different 14 year olds at a random location across the globe around once every two hours. This is probably going on on every campus in every school in America. Face it, if you have a machine which has a static ip, and you run some kind of service on it, someone's gonna make a try. Luckily for national security most of them are just retarded kiddie hax0rs with no life.
-W.W.
Thats why sensitive computers are not networked (Score:1)
Don't ask how I know, but I have it from reliable sources that clasified data may not be kept on a computer connected to external networks.
I don't know if they have that command center under a mountain, but when they do need to transport data long distances, they have not forgotten the bandwidth or security avaiable in a military convoy filled with 8mm (or whatever technology) tapes. When they need a lesser amount of data, they have networks they trust, but though they may run IP they are not internet connected.
Of course they do have internet connected computers, lots of them. Orange book rules (or is it red book) prevent any system less then A1 (or B2, I can't recall) to store even low classification information on a net connected system.
Dumb Encryption Regulations (Score:1)
The encryption laws should be changed but not for these reasons.
The only changes which would effect the security of individual computers would be somewhat akin to a propoganda campaign like during WWII. Just change the slogan from "loose lips sink ships" to "loose ports aid terrorist cohorts" or something.
I'm suprised that any foreign attacks on US military computers don't originate from US ISPs. If you're going to go to the trouble of cracking into a Russian machine, why not just extend it and crack into a US machine after that. The more jurisdictions you cross the better. Beauracracies don't like to cooperate with each other.
For that reason I think the whole conclusion is a sham. Most of the attacks from Russia are actually from Russian citizens and they for the most part aren't organized groups, or aren't organized with any particular faction. The cold war is more or less dead and gone to the public, they need a reason to bring it back (buzzword enabled no less) to squeeze more quarters from every dollar of the US citizens.
Halt citizen! (Score:1)
Gee, people don't seem afraid of porn, maybe they'll be afraid of cyburworfare!. Just imagine! Big bad racist garbage-can-lid-throwin dudes like Kevin Mitnick could be walking the streets! Take part in your community to help support increased cryptography restrictions, and the death penalty for anyone who uses a "handle".
--
As long as each individual is facing the TV tube alone, formal freedom poses no threat to privilege.
Damn Army (Score:1)
As a rule, the inventions follow the money. If other government agencies (or private citizens) had that kind of research capital, I think we'd have a different sort of inventions now. I don't think "the Super" would have been one of them.
The military invented the internet, yes, but it would have happened anyway. Probably under the control of (shudder) AT&T.
Wouldn't it be nice if there were non-military agencies that had a budget for Advanced Research Projects like the internet? Think of just how disney life would be.
--
As long as each individual is facing the TV tube alone, formal freedom poses no threat to privilege.
Cyberwarfare, Star Trek style (Score:1)
Did not!
Does too!
Mooooooooooommmm!
--
As long as each individual is facing the TV tube alone, formal freedom poses no threat to privilege.
From Russia with a smile :) (Score:1)
I attempted to do the worm and injured my spine.
--
As long as each individual is facing the TV tube alone, formal freedom poses no threat to privilege.
Then you aren't on a classified network. (Score:1)
Sounds about par for the course... (Score:1)
Thats why sensitive computers are not networked (Score:1)
Been to Colorado Springs lately? Cheyenne Mtn, sits adjacent to Pike's Peak.
Orange book rules (or is it red book)
I believe it's the Orange, and IBM seems to have the redbooks [ibm.com].
Thats why sensitive computers are not networked (Score:1)
Been to Colorado Springs lately?
Orange book rules (or is it red book)
I believe it's the Orange, and IBM seems to have the redbooks [ibm.com]
And do they really want people to believe that they put sensitive nat'l security info on a system accessable by the World?
Re: (Score:1)
Questioning ABC's credibility (Score:1)
Cyberwarfare is war against taxpayers (Score:1)
.
Damn Russians (Score:1)
Oops, I think I pissed him off.
Cringe.
.
Disagree. (Score:1)
:)
.
Other airlines with internet? (Score:1)
Does any other airlines have internet on board?
Just wanted to know which airline to select next time.
Damn Army (Score:1)
rabid peacknik mode on
> don't forget that it was the US Military that invented your precious Internet
The military did invent the internet. Credit given where credit is due.
>And, most great technological creations came out of war.
WTF? great inventions like nuclear weapons... Its nice living less than an hour from the end of life as we know it...isnt it
>It's the end of the cold war that has brought about a general lack of funding for general research
Not true, it's moved a lot of research into the private sector, building things that don't explode...
>a lot of us computer people work for Defense contractors
Same goes for Microsoft. That doesnt make them automatically right...
>A lot of Americans still believe a strong military is important
The same forward - thinking bunch who believes New Mexico is a foriegn country, Reagan knew what he was talking about, and Elvis is still alive...
>Just because you don't think so doesn't mean your point of view is necessarily gospel.
same for you...
rabid peacenik mode off
end rant
Damn Army (Score:1)
Eh ? (Score:1)
Their laws are harsh but have you ever walked in the city ? You can literaly eat off of the sidewalk/pavement.
And anyway - I for one am glad that yank kid got his ass wupped for spraying graffiti in their country. Who the hell does he think he is. Bet you he'll think twice about doing that again, even now when he's on good 'ol US of A soil.
Disagree. (Score:1)
Dumb Encryption Regulations (Score:1)
Very typical of american politics. They feed terrorists in Afganistan and Algeria for years and after that they are concerned that american tourists (f.e. one of Intel vice-CEOs) are being killed. They do anything they can to prevent computers around the world from being secure and after that they complain that they are being f... from russian boxes. Just brilliant...
Mil.heads, whatever...
Cyberwarfare is war against taxpayers (Score:1)
They wouldn't attack (Score:1)
There is a better example of cyber-war that could lead to a bomb-war though. Let's say that country B got sick of negotiations, and took out the telco and power grids in a major urban center. Chaos would reign (imagine New York with no power or phones for three days). Would we attack then? Yes. Reagan pretty much set the standard for those types of intrusions with attack on Libya in the 80's. For those that don't remember, that was a sticky situation for the US. You had Libyan non-government civilians attacking US citizens outside of US held land (i.e. no direct military threat or national disruption). Reagan drew the "line in the sand" and basically said that if the action is supported by a foreign government, and brings real, deliberate, physical harm to US citizens, we have the right to attack and defend ourselves. An attack on the stock market would hurt, but it wouldn't cause the kind of harm that he defined (and his statements are held as the litmus test of such interventions today).
I'd also like to add another point to your statement. It isn't actually required for a hacker to gain access to encrypted or secure networks to gain important information. Imagine the strategic value in locating a message on a non-secure military email server, from some Army generals secretary, indicating that the said general was about to leave with his troops to go visit some "military situation" before that information was made public. This information could be leaked to the press or an enemy government and tip them off to a potential attack before it came.
Also, regarding secure encrypted communications, it isn't always necessary to read that information to know somethings up. In WWII the Pacific Allied armies sucessfully predicted an incoming Japanese attack (on New Guinea I think) by monitoring their radio communications. Now, we couldn't actually understand what those communications were saying, but when Allied codebreakers noticed a massive increase in the number of transmissions being sent to one area, they correctly predicted that an attack would come from there, and the Allies were able to fend off the attack. Now, imagine you're an enemy of the US and American armies are sitting right across your border threatening to attack (the Saddam Hussein situation). What would you surmise if your government paid cracker informed you that he just detected a massive increase in the communications networks of the American army? That's what the Pentagon is worried about.
There's sensitive and then there's sensitive (Score:1)
If my assumptions about basic human nature are correct, there are probably illegal gateways from the "secure" net to the "public" net, too. It's just too inconvenient to have to go to a different machine to get your email, and just to cool to "beat the system" and make your own solution.
Don't forget the Gulf War (Score:1)
What was that about using military resources to aid private corporations? Oh, yes, I recall both Israeli and Chinese intelligence engage in industrial espoinage too. Looks like we're in good company.
I do not believe there exist many nations that do not spy on all their buddies.
A better conspiracy theory (Score:1)
An interesting thought, but perhaps it's not the army and not even about money. The FBI has been pushing pretty hard against digital privacy lately--they could be orchestrating these "attacks" to promote a sense of insecurity so that more Americans will be sympathetic to the FBI's stance against privacy.
Just a fun guess.
Punch Card Story (Score:1)
William Gibson (Score:1)
Etymology (Score:1)
The French Connection (Score:1)
It may be mere coincidence, but a few weeks earlier one of the guys who worked here had met a French girl in a bar. She was the standard French girl : beautiful, mysterious, flirtatious, etc. She claimed that she was an out of work "nanny" and needed a place to stay. He agreed to let her stay at his place until it was time for her to go back to France. According to him she never asked him about work or anything like that, but it makes you think....
Damn Russians (Score:1)
TANG! was invented for the space program.
So was Velcro!
So was Freeze Dried Food!
So was.... well lots of other things.
cyberwar has already begun, it is old history (Score:1)
no matter where they come from or how systematic they seem, the gov't wouldn't come forward with this story if they hadn't already had the situation under control.
Cyberwarfare is war against taxpayers (Score:1)
Cyberwarfare is war against taxpayers (Score:1)
Damn Russians (Score:1)
to invented your precious Internet, okay?
Taxpayer military funding is what payed for
arpanet.
And, most great technological creations came
out of war. What better way to speed up
innovation? It's the end of the cold war that
has brought about a general lack of funding for
general research anymore...
Besides, a lot of us computer people work for
Defense contractors. Cut the Military funding,
and our jobs are gone... There is another side
to this issue. It's not just wasting money. A
lot of Americans still believe a strong military
is important. Just because you don't think so
doesn't mean your point of view is necessarily
gospel.
Thanks for reading.
They have balls (Score:1)
Cyberwarfare is war against taxpayers (Score:1)
some other thoughts (Score:1)
There was a good article in Wired about a year ago that outlined what could happen in the future if a so called "Cyberwar" were to happen, and perhaps this bullshitting by the government is just one of the first steps in an already thought out war, with no casualities, no battles, just 1's and 0's flying at each other over copper and fiber.
Thats why sensitive computers are not networked (Score:1)
Then again, now that I've brought this up, maybe the cat is out of the bag and I'm going to mysteriously disappear in the middle of
--
Mark Conty
mdc@isd.net
Thats why sensitive computers are not networked (Score:1)
--
Mark Conty
mdc@isd.net
cyberwar has already begun, it is old history (Score:1)
Also, I worked for the DOD in '86-87 as a student and I am well aware that they seperate their networks. Computers are VERY CLEARLY labled as secure or insecure and are on seperate networks. If they have continued that policy and I can think of no reason for them not to then I would be VERY suspicious of anyone claiming there were gateways between the non-secure and secure networks. The DOD does not mind double duty when re-entering data. There are many ways to get info into a computer without using a network. Also work is divided up between that which needs a secure system and that which does not. The Walker spy ring did wonders for fixing holes in American security by revealing we had TOO MANY secrets and thus too many people needed secret clearence to do mundane jobs.
--Pete
Misuse of terminology (Score:1)
Damn Russians (Score:1)
>and our jobs are gone
Ending WWII also put an end to SS Officer's jobs.
Your job as a weapons builder can't be used as an argument for maintaining military funding.