Just thinking......
Would it not make more sense to counter an EMP attack from Space as the first line of defence against network disruption. While cyber virus attack is 2nd line of defence.
From a Nuke Blast.
The recent Shangri-la dialogue in SG had a bit of focus on cyber warfare.
Now pre-emption may be an option.
http://www.foxnews.com/scitech/2010/06/15/pentagon-cyber-command-cyber-war/?test=latestnews
cyber attack? would you not sacrifice the Element of surprise attack?
Originally posted by weasel1962:Interesting cos cyber attacks are already happening.
In peacetime, cyber attacks can result in critical information loss. Besides schematics, it includes logistics, practices, SOPs etc. All of which represent info that can be used in war.
The 1967 six day war is an example of utilising organisational data. The israelis knew egyptian pilots tend to sleep through a certain time. Hence attack was at that time.
Cyber warfare can generate opportunities for such exploitation on a different vector.
Just a few thoughts......
Data defence could easily be deployed by implanting false informations. So a successful extraction of information would still need to verify the data. Ground intel is needed.
A PRC NGO lead cyber attack would result as a portal it could easily do a reverse mapping of the intel network. almost the same case as a Terrorist cell that is identified but would still monitors information and plans rather than take out the cell.
Cyber attack has open up hostilty "Intend" from the chinese side against the US to undertake cyber defence.
Did anyone read the report about US having an internet kill switch?
Major Cyber Security Conference Set for Singapore
http://www.defensenews.com/story.php?i=4699902&c=ASI&s=TOP
Top military cyber-security experts from across the world are currently in town.
2 years and US$100m sufficient to build cyber army to hack US network defenses.
http://news.yahoo.com/s/afp/20100801/tc_afp/usitinternettelecomsoftwarespydefcon_20100801202223
If you are Good, you can even join them.
Cyber snoops launch recruitment drive
Posted Mon Aug 2, 2010 4:00pm
A secretive and elite United States cyber team that has tracked criminals on the internet for more than 10 years has used this year's DefCon hackers conference to recruit new members.
The chief of the normally secretive team, Chet Uber, described Vigilant as a cyber "A-Team", taking on terrorists, drug cartels, mobsters and other enemies on the internet.
"We do things the government can't," Mr Uber said.
"This was never supposed to have been a public thing."
Vigilant is an alliance of slightly more than 600 volunteers and its secret ranks reportedly include chiefs of technology at top firms and former high-ranking US cyber spies.
The group scours internet traffic for clues about online attacks, terrorists, cartels and other targets rated as priorities by members of the democratically run private organisation.
Vigilant also claimed to have "collection officers" in 22 countries that gather intelligence or coordinate networks in person.
"We go into bars, look for lists of bad actors, get tips from people," Mr Uber said.
"But a significant amount of our intelligence comes from our monitoring the internet.
"We are looking at everything on websites, and websites are public."
Mr Uber says the team shares significant findings with US spy agencies and is so respected by leading members of the hacker community that he was invited to DefCon to recruit new talent.
He says Vigilant came up from underground after 14 years of operation in a drive to be at "full capacity" by adding 1,750 "vetted volunteers" by the year 2012.
"We are good people not out to hurt anybody," Mr Uber said.
"Our one oath is to defend the US Constitution against all enemies foreign and domestic."
Anything that can be looked at legally on the internet is fair game for Vigilant, with email and encrypted transactions such as online shopping off limits.
Mr Uber says his team uncovered evidence of fraud in the latest presidential election in Iran and has been testing a way for people to slip information out of countries with oppressive regimes.
He says the information obtained was given to US officials.
"They expected fraud but they didn't expect the wholesale fraud that we passed along," he said.
The holy grail for Vigilant is finding out who is behind cyber attacks.
Inability to figure out who launches online assaults routinely leaves companies or governments without targets to fire back at.
"This is a completely unsolved problem," Mr Uber said.
"We've probably been working on it as long as the government has." - AFP
GAO report on US cyber challenges.
Worst cyber attack on US military came from flash drive.
http://www.defensenews.com/story.php?i=4757211&c=AME&s=TOP
...planted by foreign intel agency.
xxxxxxxxxxxxxxxxxxxxxx
Separately cyber-chief comes up with 3 elements of cyber-security
The key in winning a cyber warfare is SPEED!
The Chinese is 1 up against the US and the rest of the world with their advanced Super Computer.
Chinese supercomputer named world's fastest
Mon, Nov 15, 2010
AFP
BEIJING - China overtook the United States at the head of the world of supercomputing on Sunday when a survey ranked one of its machines the fastest on the planet.
Tianhe-1, meaning Milky Way, achieved a computing speed of 2,570 trillion calculations per second, earning it the number one spot in the Top 500 (www.top500.org) survey of supercomputers.
The Jaguar computer at a US government facility in Tennessee, which had held the top spot, was ranked second with a speed of 1,750 trillion calculations per second.
Tianhe-1 does its warp-speed "thinking" at the National Centre for Supercomputing in the northern port city of Tianjin - using mostly chips designed by US companies.
Another Chinese system, the Nebulae machine at the National Supercomputing Centre in the southern city of Shenzhen, came in third.
The United States still dominates, with more than half of the entries in the Top 500 list, but China now boasts 42 systems in the rankings, putting it ahead of Japan, France, Germany and Britain.
It is not the first time that the United States has had its digital crown stolen by an Asian upstart.
In 2002, Japan made a machine with more power than the top 20 American computers put together.
The supercomputers on the Top 500 list, which is produced twice a year, are rated based on speed of performance in a benchmark test by experts from Germany and the United States.
If a malaysian can hack into US Fed, how much more can the PRC hackers do?
M'sian hacked into US Fed
NEW YORK - A SOPHISTICATED Malaysian cyber bandit hacked into the US Federal Reserve's computers and also stole nearly half a million credit and debit card numbers, US prosecutors in New York said.
Lin Mun Poo, a Malaysian resident and citizen, was arrested on October 21 soon after entering the United States and was indicted by grand jury on Thursday, the US attorney's office in Brooklyn said.
He allegedly hacked into the Cleveland, Ohio branch of the Fed, the US central bank, and in separate attacks also stole more than 400,000 card numbers, as well as breaching the defences of numerous other systems.
Poo, who is being held in pre-trial detention, 'made a career of compromising computer servers belonging to financial institutions, defence contractors, and major corporations, among others, and selling or trading the information,' the US attorney's office said.
'Secret Service agents seized his heavily encrypted laptop computer, which contained a massive quantity of financial account data and personal identifying information that he had allegedly obtained by hacking,' the prosecutor's office said.
Among the other alleged hacking by Poo, the Secret Service said he entered a Pentagon contractor's system 'potentially compromising highly sensitive military logistics information.' -- AFP