It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by MemoryShock
Or could that suggest (the conspiracy theorist in me makes this leap) that we are perhaps witnessing the beginnings of the foundation for a "Virtual Cold War"?
From Crakeurs Link
Qin says outside of China there is a "Cold War Ghost." He says people haunted by this ghost also suffer from a virus called "China threat," which he says makes people want to tarnish China with lies.
Originally posted by JohnJetson
government would thought it necessary to take precautionary measures (ie. reflashing the firmwares) before rolling them out for use in the states.
Originally posted by DraconianKing
I've been worried about all out cyberwar for a while now. The US is probably bottom of the list in terms of being ready for a true cyberwar. Our military brass have no clue just how powerful a weapon the computer can be. Right now if Russia or China had enough brilliant security experts and equipment they could practically destroy this country overnight.
I've been into the information security scene for over a decade and you might think that by now the government and corporations would be secure but it's just not the case. I will say that finding your own high value 0-day exploits has become quite a challenge for an individual but selling pre-exploited routers to the US sure makes life much easier.
This also makes it easier to get into closed networks(not connected to internet). Many of our key infrastructures are run on closed networks for security reasons but with pre-exploited hardware they become vulnerable. It would still be tricky to get data off the network but if destruction is your only goal then life is good. You would just need to figure out a practical way to trigger the event.
I can't say when a serous cyberwar could break out but I certainly have seen my fare share of interesting activity on the darknets. I've also seen some serious bits of code floating around that had to be written by true zen masters. Just sneak peaks but enough to show you the kind of minds that you are up against and working with. If the US is attacked then put your faith in the public sector of America's information security elite, the government will be useless. They will probably go straight into blame mode.
Just one genius could seriously give the US major problems now imagine a whole bunch of specially trained and well funded individuals with all sorts of toys and code to crush you with.
Originally posted by sliznut
This baffles me. I have seen people make these statements time and time again. While the Web is a dangerous tool in the wrong hands, did you all forget that WE created the Internet? What makes you think that we are at the bottom of the pile in terms of security? I am an IT professional with security focus. I have close friends that work for OUR military due to their skills in creating worms and viruses that destroy systems. Our country is not perfect by far, but do not forget that this playground we call the Web was invented right here in the USA.
"We run Linux on servers for a reason. If you look at all malware out there and call it 100%, that is what Windows is capable of getting. On a Mac it may be 5%. On Linux its less that half of that 5%."
Point being: we do not have dummies running this show here on the IT front.
Originally posted by sliznut
Only certain personality types (or people who are simply paid, very well) can be able to disconnect their brains from their hearts like that, but yeah, they can be found infecting botnets onto every machine on Earth in the name of "My Country".
Now back to your response. Would you rather I write a code to infiltrate a potentially threatening system to gain access and shut it down? Or would you rather I bomb a bunch of innocent people to stop a threat?
I 100% agree with you that the powers that be, including us, view weak systems as a simple spy tool. But what are the alternatives in a hostile world? And for the record the only blackhats I know that got military positions got those because of DEFENSE RESEARCH. They wanted to know how these people could crack systems like this and manipulate them to make our systems as impervious as possible. Blackhats generally work for their own profit, not the forward progression of anything but their bank accounts. Last I checked the military wasn't paying very well.
I come from a military family. My great grandfather, grandfather, father, and all my uncles actively fought in wars. Personal tragedies really. I work in the private sector doing basic IT work and making pretty good money. I do security systems. This is going to be the playground of the next battles, or the precursor and our military is completely aware of this. You make a preemptive attack on a power grid and follow it up with air strikes and a country/city is in trouble.
Why do you think most universities now offer "Information Warfare" classes as part of an IT degree? How many other majors do you hear of involving any classes to do with warfare? We are fully aware of this and this was my simple point. I'm just sick of paranoid people talking # about our country when they don't even know what's going on.
On a good note, I do completely appreciate your intelligent response to my post. Good discussion will never hurt any of us.
According to Army Brig. Gen. John Davis, deputy commander for network operations, the money was spent on manpower, computer technology and contractors hired to clean up after both external probes and internal mistakes. Strategic Command is responsible for protecting and monitoring the military's information grid, as well as coordinating any offensive cyber warfare on behalf of the U.S.
Officials would not say how much of the $100 million cost was due to outside attacks against the system, versus viruses and other problems triggered accidentally by Defense Department employees. And they declined to reveal any details about suspected cyber attacks against the Pentagon by other countries, such as China.
Speaking to reporters from a cyberspace conference in Omaha, Neb., the military leaders said the U.S. needs to invest more money in the military's computer capabilities, rather than pouring millions into repairs.
"You can either pay me now or you can pay me later," said Davis. "It would be nice to spend that money proactively ... rather than fixing things after the fact."
Officials said that while there has been a lot of anecdotal evidence on the spending estimate, they only began tracking it last year and are still not sure they are identifying all the costs related to taking computer networks down after a problem is noticed.
WASHINGTON (AP) -- Wanted: Computer hackers.
Buffeted by millions of digital scans and attacks each day, federal authorities are looking for hackers -- not to prosecute them, but to pay them to secure the nation's networks.
General Dynamics Information Technology put out an ad last month on behalf of the Homeland Security Department seeking someone who could "think like the bad guy." Applicants, it said, must understand hackers' tools and tactics and be able to analyze Internet traffic and identify vulnerabilities in the federal systems.