Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Media The Internet Technology

Behind Cyberwar FUD 98

Nicola Hahn writes "The inevitable occurred this week as The Economist broached the topic of cyberwar with a couple of articles in its July 3rd issue. The first article concludes that 'countries should agree on more modest accords, or even just informal "rules of the road" that would raise the political cost of cyber-attacks.' It also makes vague references to 'greater co-operation between governments and the private sector.' When attribution is a lost cause (and it is), international treaties are meaningless because there's no way to determine if a participant has broken them. The second recommendation is even more alarming because it's using a loaded phrase that, in the past couple of years, has been wielded by those who advocate Orwellian solutions. The other article is a morass of conflicting messages. It presumes to focus on cyberwar, yet the bulk of the material deals with cybercrime and run-of-the-mill espionage. Then there's also the standard ploy of hypothetical scenarios: depicting how we might be attacked and what the potential outcome of these attacks could be. The author concludes with the ominous warning that terrorists 'prefer the gory theatre of suicide-bombings to the anonymity of computer sabotage — for now.' What's truly disturbing is that The Economist never goes beyond a superficial analysis of the topic to examine what's driving all of the fear, uncertainty, and doubt (PDF), a subject dealt with in this Lockdown 2010 white paper."
This discussion has been archived. No new comments can be posted.

Behind Cyberwar FUD

Comments Filter:
  • Yup (Score:1, Interesting)

    by kyrio ( 1091003 )

    Still posting at -1

  • i guess you have never read it before. Economist is a private interest mouthpiece that serves whatever their financiers tell them to do, depending on what their backers need as policy at any given period. Judging from the contents of your summary, one can easily say that this time the group they are licking the boots of is RIAA.
    • by AnonymousClown ( 1788472 ) on Sunday July 04, 2010 @09:07AM (#32791712)
      Every media outlet, should be read, viewed or listened to with a critical eye or ear. It's not just for media companies with a policy of bias, such as Fox News' conservative bias (American version), but also for normal human bias. To take any media outlet as being 100% unbiased truth is foolish.

      The Economist is a bit conservative on the side business, but as far as being their lackey - I'm not so sure about that. Sometimes they come out with things that can be interpreted as almost anti-business. They've also been doing some rather critical pieces on BP lately as an example.

      Or is BP behind on their payments to the Economist?

      • Re: (Score:2, Informative)

        by jhoegl ( 638955 )
        Bandwagons.... everyone has one.
        • Re: (Score:1, Funny)

          by Anonymous Coward

          Bandwagons.... everyone has one.

          Except for the Church of Scientology.

        • by slick7 ( 1703596 )

          Bandwagons.... everyone has one.

          As easy as it is to jump on one, it is easy to jump off, too.

      • by KDR_11k ( 778916 )

        Even a biased publication has to look out for its reputation, propaganda is worthless if people just ignore it and slamming a company that's already in bad reputation is an easy reputation boost.

        Then again with the sales numbers of tabloids I'm not sure people ignore disreputable sources...

        • Re: (Score:2, Insightful)

          by hedwards ( 940851 )
          Well, here's the thing, Fox News doesn't seem to have any trouble attracting viewers, and it's been pretty much garbage since the day it was created. Likewise AM talk radio doesn't even pretend to accurately portray reality. I don't think that reputation is really something that matters as much as perhaps it should.
          • Re: (Score:1, Insightful)

            by Anonymous Coward

            Fox has mostly talk shows. And if you listened close enough you'd hear that portion when the commenter on each show speaks. I personally stopped watching Fox a long time ago for that very reason. They have more talk shows than they do news at this point. Do not confuse a talk show with news. Even then the news they report on is biased just as much as CNN, NBC, and CBS report on news, but don't bash one without at least admitting the bias of the others. Without comparing the two, you become what you're

          • http://en.wikipedia.org/wiki/Jane_Akre [wikipedia.org]

            What other "news" organization would go to court to defend their right to lie in a "news" story?

            If you tell the viewers what the viewers want to hear (regardless of any factual basis) then you will attract a lot of viewers.

      • that means you havent been following economist.

        precisely the articles/views that any given american conglomerate dominant in any given field is publicized in economist exactly at the convenient times. no earlier, no less. american media industry stages an attack against net neutrality ? you will find economist either preceding it with an article or following immediately after it starts. copenhagen talks are coming up in regard to climate ? same. moreover, the views and defenses it reflects also continues
        • Re: (Score:1, Informative)

          by Anonymous Coward

          If it gets busted, it can be "liquidated" (cut up). The bad pieces - the debt - can then be bundled separately and shiped off to international central-banks' debts, to be paid off by the people.

          Meanwhile, the "good" parts are re-bundled, bought up (with emergency, government-backed loans) and integrated into som lesser company (or agglomeration tereof). Which then becomes "BP" again, with another name, swallowed up from the inside. The same names, however, will crop up in the new boardrooms, and as investor

      • It's still better than most publications, but ten years ago it was great.

        I have noticed a decline in the quality of their reporting, and a greater willingness to toe the government line.

        I recently let my subscription lapse.

      • by AHuxley ( 892839 )
        From the CIA, organised crime, KGB, FSB, MI5/6, ready made press kits, philanthropists, faith based groups, political activist to todays need to play safe and friendly to keep "assess".
        Someone is pushing something, best just to read all you can and see who had the better overview as history rolls out.
        Some always stand out as having got it more correct than just trying to hide or shape.
    • by k10quaint ( 1344115 ) on Sunday July 04, 2010 @09:11AM (#32791724)
      Someone is standing a bit to the left of Lenin. Oh, and as far as cyber wars go, the one between 4chan and Youtube seems to be heating up!
      • by Jurily ( 900488 )

        Someone is standing a bit to the left of Lenin. Oh, and as far as cyber wars go, the one between 4chan and Youtube seems to be heating up!

        Shhhh! You don't want Barack to shut down the internet [cnet.com], do you?

        • I don't know, I mean if it takes 4chan with it...

          • by bersl2 ( 689221 )

            4chan is just the online manifestation of sociopathic forces which have been in effect for the entire existence of civilization. You're essentially stating your desire to stick your head in the sand, as the metaphor goes.

      • what's the problem with standing a bit to the left of lenin, come again ?

        rupert murdoch gets his stomach upset when he sees one ? or, fox news says so ?
    • Re: (Score:2, Insightful)

      by boarder8925 ( 714555 )

      Judging from the contents of your summary, one can easily say that this time the group they are licking the boots of is RIAA.

      No, The Economist seems to be blowing the government, at least in this case.

      • Re: (Score:2, Funny)

        by Anonymous Coward

        So long as they're not blowing a vuvuzela, who cares.

    • by westlake ( 615356 ) on Sunday July 04, 2010 @09:48AM (#32791840)

      Economist is a private interest mouthpiece that serves whatever their financiers tell them to do, depending on what their backers need as policy at any given period. Judging from the contents of your summary, one can easily say that this time the group they are licking the boots of is RIAA.

      The Economist has been around since 1843.

      It is anchored in a classically liberal and centrist tradition - and has never been particularly well-known for boot-licking.

      Too often when visiting here I find evidence that the eternally adolescent geek simply can't accept that there can be a principled opposition to his own set beliefs.

      • Doesn't change the fact that they supported the RIAA and more generally speaking the whole music and film industry in what will probably be recalled in History as the stupidest and most reactionary suicide of all time by an industry.
        And that's not (by far) their most disputable position.

        Everyone is entitled to his own opinion and every publication is entitled to publish what it feels should be published, and to cover the news with the angle it sees fit.
        but afterwards you have to either take responsibi
    • Are you kidding? "The Economist" is the print edition of MENSA - anyone stupid enough to buy into either one shows that they're not really all that smart.

      The real genius is in milking the "sophisticates".

      Moo!

    • Re: (Score:2, Interesting)

      summary, one can easily say that this time the group they are licking the boots of is RIAA.

      While it would not surprise me at all if that's true, the 'whitepaper' referenced in the summary reads like a poorly researched conspiracy theory. It says this about the Wall Street Journal without providing a reference:

      So whats going on is that you have one large corporation selling its product to other large corporations, where the product is the eyes and ears of the ruling class.

      It also makes claims about attrib

    • by Z8 ( 1602647 ) on Sunday July 04, 2010 @11:05AM (#32792118)

      one can easily say that this time the group they are licking the boots of is RIAA.

      The Economist is the world's best weekly newspaper. If you read what they say about the RIAA [economist.com], including the first article which mentions how the RIAA's agressive tactics aren't working and are a lesson to other industries on what _not_ to do, you'd know that the Economist takes a moderate view on intellectual property.

      In particular, they often report on academic research showing that IP laws are too strong. For instance, this article [economist.com] (subscription required) called "Killing Creativity" is about how overly strong IP laws can smother innovation.

    • So called followers of Adam Smith have been reading the old boy a bit since the crash,and realised that he would have disapproved of almost everything they were supporting. The Economist hasn't really admitted that they bet their money on the bob-tailed nag - but they do seem recently to have remembered a bit that AS was opposed to cartels, and supported the free exchange of information.
    • by PPH ( 736903 )

      Economist is a private interest mouthpiece that serves whatever their financiers tell them to do,

      Or, as the paper referenced in the summary suggests, their reporters are suceptible to manipulation of public opinion by organizations like the CIA.

      Judging from the contents of your summary, one can easily say that this time the group they are licking the boots of is RIAA.

      The RIAA doesn't have to hide their agenda. They might make up outlandish statistics, but they are pretty straightforward about the problem being piracy rather than cyberterrorism.

      Someone (the CIA?) is angling for control over the Internet. But they can't sell it based on their actual agenda. That sounds a lot like the sorts of propoganda operations they (the C

    • i guess you have never read it before. Economist is a private interest mouthpiece that serves whatever their financiers tell them to do, depending on what their backers need as policy at any given period. Judging from the contents of your summary, one can easily say that this time the group they are licking the boots of is RIAA.

      Look at how dumb you are.

  • by betterunixthanunix ( 980855 ) on Sunday July 04, 2010 @09:18AM (#32791750)

    The internet was designed for convenience and reliability, not security.

    The logical conclusion should be, "disconnect security sensitive systems from the Internet, go back to the older ways of managing those systems and design more secure networks for those systems." Oh, sorry, I forgot that convenience is actually more important than anything else, so that will never happen.

    • Convenience? (Score:5, Interesting)

      by SgtChaireBourne ( 457691 ) on Sunday July 04, 2010 @09:56AM (#32791856) Homepage

      What's convenient about electrical grid systems designed to fail [cnet.com]? We've even had the East Coast power grid, which includes part of the midwest and Canada fall down, allegedly related to some idiot using Microsoft products in mission critical situations. We've also had extended air traffic shut downs [techworld.com] for the world's 8th largest economy. But hey check out that spin. The headline says it's the fault of the flunky who needs to reboot the Microsoft "server" every few hours, rather than hanging up the criminals who replaced working systems with Microsoft products.

      Secure systems are convenient: they work.

      • We've even had the East Coast power grid, which includes part of the midwest and Canada fall down, allegedly related to some idiot using Microsoft products in mission critical situations.

        1965 Nov 9 Northeast Blackout [wikipedia.org] Cascading series of transmission line overloads traced to safety relay at Niagara's Adam Beck station. (human error)

        1977 July 13 New York City Blackout of 1977 [wikipedia.org] (Lightning strikes take out four transmission lines)

        1998 January (ice storms)

        1999 July 5 (Boundary Waters-Canadian Derecho)

        2003 August

        • by cusco ( 717999 )
          Thanks. I was trying to figure out what the frack he was talking about, since I certainly never remember losing part of the grid because of any MS system failure. Since I used to work in the electrical generation/distribution industry I tend to pay attention to it, and couldn't think of a single instance. Figured he was full of crap, and it was nice to have someone else do the work of looking it up for me. Probably another Apple fanboi.
    • by darkfire5252 ( 760516 ) on Sunday July 04, 2010 @01:07PM (#32792726)

      The logical conclusion should be, "disconnect security sensitive systems from the Internet, go back to the older ways of managing those systems and design more secure networks for those systems."

      The reason that some people give 'cyberwar' more thought than that is that it's not as simple as you make it out to be. I'm a coauthor on a DOE sponsored paper (under security review, so no citation for now) that covers some more subtle aspects of the problem. The electrical grid can be attacked by compromising the control system if that system is internet connected, true. However, if a significant proportion of the electrical load for any one generator can be controlled via the internet, then that generator can be attacked via the internet without requiring any direct internet contact. Case in point, X10, Google, Microsoft, and many other companies are currently looking into home automation and controlling the home's electrical system via the computer. So, what happens the next time there's a runaway MS worm, but instead of just sending spam it gives control of the home automation system to the attacker? Simply by turning the power off in enough houses in an area, an attacker could actually cause physical damage to the power plant.

      That's why we can't just dismiss the problem as "unhook the power plants from the internet." In a world that's increasingly hooked to the internet, we can't afford to overlook how the internet-connected components can possibly have an effect on the non-connected components.

      • by cusco ( 717999 )
        You're thinking too hard. Look at it from the point of view of a terrorist and just ask, "How can I take down the electrical grid?" Sending someone to school for several years to learn programming and then hoping that they're bright enough to create a worm that evades evades firewalls and antivirus products long enough to actually get control of something, then hoping that he doesn't get caught, and then hoping that they're at the same time stupid enough to hand that control over to you rather than extort
    • The logical conclusion should be, "disconnect security sensitive systems from the Internet, go back to the older ways of managing those systems and design more secure networks for those systems."

      Or it's equivalent:

      iptables -P INPUT DROP

      iptables -P OUTPUT DROP

  • by Anonymous Coward on Sunday July 04, 2010 @09:32AM (#32791792)
    >I AM THE PRESIDENT OF THE UNITED STATES
    >Greetings Mr. President

    >DOWNLOAD ALL SECRET FILES TO DISKETTE
    Working....Done.

    >DEORBIT SURVEILLANCE AND COMMUNICATION SATELLITES
    Working...Done.

    >TURN OFF NORTH AMERICAN POWER GRID
    Working....D


    .
    • by warGod3 ( 198094 )
      More like: "Shall we play a game?"
    • That's why the NSA has developed edsh, a new shell to use on *nix computers. The following is an actual transcript from an occasion when an NSA agent has accidentally left an edsh session open and an attacker tried to abuse it.

      ~ # ls
      ?
      ~ # cd /
      ?
      ~ # login
      ?
      ~ # jsmith
      ?
      ~ # help
      ?
      ~ # ^D
      ?
      ~ # ^C
      ?
      ~ # ?
      ?
      ~ # I AM THE PRESIDENT OF THE UNITED STATES
      ?
      ~ #

      You see, edsh has completely thwarted the attack. It is for this reason, that it will soon be declared the standard shell.
  • Doomsday BS (Score:5, Interesting)

    by Alwin Henseler ( 640539 ) on Sunday July 04, 2010 @09:44AM (#32791828)

    Gotta love this paragraph:

    What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.

    If you enable above-mentioned critical infrastructure to be controlled over a public network (no matter how well secured), that's a design flaw. Any damage from that should go on the account of the boneheads that designed things that way, not on cybercriminals that find a way in & abuse it. It's okay to use network-connected equipment to help optimize / monitor whatever public utility. But the controls should always go through (on-site) humans and/or network-independent systems.

    Such doomsday think is BS anyway: if you keep the above in mind, it couldn't happen as long as attacks are limited to network / cyberwar operations. In case of physical attacks: that's a whole different ballgame. And if systems are designed such that network break-ins alone can disrupt critical infrastructure, then you deserve whatever you get.

    • Re:Doomsday BS (Score:5, Interesting)

      by Svartalf ( 2997 ) on Sunday July 04, 2010 @10:06AM (#32791882) Homepage

      Unfortunately, your supposition is incorrect.

      They DO allow the controls to be accessible in that way. Even with the best designed systems, screwups occur and with disturbing frequency in this space.

      I concur that they should be designed in the right way for this sort of stuff, by the way, but again, they're not and probably won't be for a while yet to come. FUD? Perhaps. Perhaps not. The problem is that there's a disturbing amount of truth within it that people keep dismissing here and elsewhere. It IS quite as bad as people have been claiming it is within this space- and unless you work with the segment, whether it be with the utilities or things like subways, you might not get that there REALLY is a problem that needs fixing and think it purely conjecture or outright lies to generate money for themselves.

      It's not. With the grid in the shape it's in and with them carelessly exposing the control networks in manners that they can be manipulated via remote, there is a possibility, very real, very distinct, that someone could manage something that'd make the 2003 East Coast Blackout look like a Sunday picnic.

      • This cyberwar BS is totally overblown. How exactly can someone send a satellite spinning out of orbit with just a computer and an internet connection?
        • by Svartalf ( 2997 )

          If you get access to the management interface, you can do damned near anything to it including deorbiting the thing. It's just that simple. The management interface is on a computer likely to be accessible via the Internet in some fashion, through a botnet compromised machine or similar. Given a bit of effort, I probably could do that much myself- and I'm little more than an old-school grey-hat.

          It's a lot less BS than you'd think.

    • by Simmeh ( 1320813 )
      FTFA
      "...freight and metro trains derail"

      Only if theres a buffer overflow....
    • How much FUD can you pack into a paragraph? This piece

      What will cyberwar look like?

      pretty much presses all the buttons that the gullibly paranoid just love to swallow - after all, everyone loves a crisis.

      The things is, all we can say about future threats is that they never turn out the way we've planned for them. Pearl harbour? who'd thought it? Sept 7? oops, didn't see that coming either. Fall of the USSR? dang! we never got to use all those nukes. So if / when there is what historians will look back on as cyberwar (or the first c

      • by DarkIye ( 875062 )

        The things is, all we can say about future threats is that they never turn out the way we've planned for them. Pearl harbour? who'd thought it? Sept 7? oops, didn't see that coming either. Fall of the USSR? dang! we never got to use all those nukes. So if / when there is what historians will look back on as cyberwar (or the first cyberwar), it almost certainly won't be the "war" that the government spent billions preparing for.

        Cherry-picking. There are quite a number of threats that western governments have prepared for correctly, since it's a rare thing for intelligence to misreport the enemy's situation on the scale of 'Japan are not hostile'. The main point, however, is that Cyberwar, in the way this article describes it, is not going to happen, because it has little bearing on reality, in actuality or from the viewpoint of anyone but the Economist and anyone ignorant enough to believe them.

    • by r00t ( 33219 ) on Sunday July 04, 2010 @12:49PM (#32792640) Journal

      For those of us in-the-know, it's painful to see people like you here on Slashdot. Due to NDA and various laws, we obviously can't go pointing out exactly how the USA truly is at risk.

      Rest assured that this stuff is on the Internet, it's buggy as hell, it's misconfigured, and the passwords are as lame as you can imagine. We're already hacked into, at all levels, both government and private.

      The main limitations for the attackers are a lack of obscure knowledge and their own preference for quietly stealing information. Why screw with a super-crufty undocumented railroad control system when you could be reading Hillary's email or picking up a copy of the F-35 radar software?

      • Re: (Score:3, Interesting)

        by Velex ( 120469 )

        Rest assured that this stuff is on the Internet, it's buggy as hell, it's misconfigured, and the passwords are as lame as you can imagine. We're already hacked into, at all levels, both government and private.

        The sad thing is that 4 years ago I might have thought you were being a fear-monger. However, after working in a call center that handles gobs of information every day just to see management thinking that setting everyone's passwords to "1234" is a good idea because 1.) it's easy and 2.) having to remember passwords is too technical for pregnant teenagers and 20-somethings I completely believe you.

        If a baby-mamma is inconvenienced in any way, especially any way involving using her brain, the stars will

      • Mod parent up - cyberwarfare and TSA-like technobabble might be stupid, but targeted computer intrusions are very real. No, your IDS will not react. No, your antivirus is useless. No, you won't be able to detect a compromised computer by hand either. Assuming the kind of tech easily and freely available through metasploit, the only way I know of to detect a reflective DLL injection attack is through direct inspection of process memory. 0day exploits? Fuzzing and good workflow will find you those easily. If
    • by ljw1004 ( 764174 )

      It might be a design flaw, but it's also the inevitable consequence of a free market economy...

      The companies that put their control systems on VPN over public internet got by a heck of a lot more cheaply then their competitors. And they haven't yet been attacked badly enough so it's been cost-effective so far. Meanwhile their more robust competitors go out of business.

    • by cusco ( 717999 )
      Clarke is a glory-hogging neo-con weasel who has made a career of telling idiots in power exactly what they want to hear. He never saw a proposed restriction on public liberty that didn't give him a woody thinking about the resultant power grab, and has done everything in his power to gut the Bill of Rights in the name of 'security'.

      If you read his 'Against All Enemies' and accepted it at face value you'd think he personally saved western civilization (audio book, long drive). If you really know the st
  • by simonbp ( 412489 ) on Sunday July 04, 2010 @10:38AM (#32791998) Homepage

    Before you start dismissing the article without reading it, they do have a very good point that cyberattacks by governments should have consequences for those for those governments. If Russia were to blow up the HQ of a company they didn't like, everybody would up in arms about, but if they hire a bunch of script kiddies to go in an wipe the company's server farm (effectively destroying the company), it probably wouldn't even draw a comment from the State Department. That's not a good precedent to set for the future...

    • by HiThere ( 15173 )

      1) How do you know that the suspected attacker is the real attacker?

      2) Why were they able to "wipe the copany's server farm"? Sounds like gross incompetence at the company. What happened to the backups?
      (That said, backups often AREN'T sufficiently checked for readability...because of financial constraints. But that's still gross incompetence, only at the managerial level rather than at the operating level.)

    • You forget that there's no need for the government to hire the "kiddies" directly, if they can whip them up into a nationalistic frenzy. And if they employ more skilled people, unless they fail epically, they're not going to be traceable back to their employing nation.
    • Before you start dismissing the article without reading it, they do have a very good point that cyberattacks by governments should have consequences for those for those governments. If Russia were to blow up the HQ of a company they didn't like, everybody would up in arms about, but if they hire a bunch of script kiddies to go in an wipe the company's server farm (effectively destroying the company), it probably wouldn't even draw a comment from the State Department. That's not a good precedent to set for the future...

      That sounds like good, common sense. However, the situation isn't that simple. As others noted, it's difficult to identify an attacker. That difficultly exists for different reasons.

      First - simply identifying an attacker is difficult. A single attacker has multiple avenues. Their control path can jump through multiple nodes from various types of networks and various nationalities with different legal structures. Those can be simple proxies, compromised hosts, or botnets. Identifying a single attacker

  • by langelgjm ( 860756 ) on Sunday July 04, 2010 @11:13AM (#32792144) Journal
    I've been seeing ads for a new degree program in "cybersecurity" at UMUC [umuc.edu] (second-career oriented portion of the University of Maryland). But I really wonder how effective such a degree could be if the person in the program isn't required to do some basic programming. From what I can tell, they aren't... they take "network essentials" and classes that include "penetration testing," but if the graduates of this kind of program are up against skilled hackers who are comfortable with bit-banging, I guess we're kind of screwed.
    • Yes, if they only have the skills given to them by these types of educations they are incompetent. Knowledge of computer security requires full awareness of as many devils in the details as possible, deep technical skills from bare metal machine code through bit-level knowledge of all common networking protocols up to PHP and web systems and languages. It is hard, opportunistic, and there's noone there to hold your hand. It's not at all impossible, however - but there are very few real "experts", on either
  • He was popular for a while after 9/11, at the time he attempted to make it seem as though he was the lone force in the world that had been warning of the threat, and a ll of the powers that be ruffled his hair and told him to be on his way... and now weren't they all sorry they hadn'rt listened. As was the case before, is seeming to be the case now, an author with enough of a grasp of the siuation to make an intelligent commment is simply not enough, he chooses to muddle the waters with a blatantly personal

  • Given all the cyber-this and cyber-that, I think cyber has taken on a new meaning in the past several years:

    Cyber (prefix) - signal to reader that he need not think critically about what follows.

    It's a shortened version of the phrase using a computer, which has also had the same meaning in the context of patents.

  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Sunday July 04, 2010 @12:03PM (#32792384)
    Comment removed based on user account deletion
    • by gtall ( 79522 )

      Cyber war got its provenance from Georgia and Estonia. The U.S. had nothing to do with it.

      The taxes were never raised to cover the wars. They should have been. They will in the future.

      Drones didn't make war more popular, look at the current poll numbers on the wars. They are an effective military option. The Taliban and Al Qaeda got their start well before the U.S. discovered drones. The Taliban and Al Qaeda continued the fine tradition of Islamo-Fascists of death to all who are not Muslim...and those who a

    • The real question is, is the concept of "cyberwar" distinct from the concept of "computer espionage"? When I read about cyberwar as a concept, people always seem to use it about situations where the computer attack becomes a physical one, like the powergrid going down, or hospitals being thrown into chaos. There is a commonly cited predecent - the http://en.wikipedia.org/wiki/Siberian_pipeline_sabotage [wikipedia.org], if that actually happened.
  • There is so much editorializing in the submission, and so little explanation, that I have no idea what the submission is about.

    Stick to the facts in the submission. The rest belongs in comments.

  • When attribution is a lost cause (and it is), international treaties are meaningless

    So the summary's argument is based on the Internet as it is, and the nations forming these international treaties being powerless to change it.

    If you honestly believe that, you deserve what you're going to get. Look at the histories of these nations and say with a straight face they cannot change the Internet. Don't say they wont; the very fact that other nations are involved gives them every reason to.

  • The REAL risk is, of course, SkyNet.
  • The wisc.edu is a very good school and nice apple and microsoft place, but not a leader in lockdown anything.

    Talking policy with comparatively little or no heuristic experience in the field, does typically indicate a political/corporate agenda, but I could not locate any connection with any FUD/dogma bbbeast.

    Anyway war and crime are two different levels of malevolence. War involves total (domestic/external) cultural participation, but crime is a more internal local and limited harm to citizens.

    Acts/laws tha

  • Bizarre articles (Score:3, Interesting)

    by Anynomous Coward ( 841063 ) on Sunday July 04, 2010 @03:51PM (#32793732)
    I've been reading The Economist for a long time now, and, save for some known idiosyncrasies like plugging CO2 taxes/trading and kicking the Euro, found it to be quite neutral, interesting and well-written. I browse a lot during the week, and the articles always catch on to the buzz, while offering real additional insight. About the only thing I don't care for is too much focus on the politics of countries that used to be part of the former British Empire, but hey, give them nostalgic Brits a break.

    The articles in the latest edition are really bizarre. They totally deviate from the quality I'm accustomed to, so much that I wondered what's going on and was about to write a LTTE.
    • by u38cg ( 607297 )
      She's called Natasha Loder, and frankly she is a bit of a fool. Hard to tell for sure but I am pretty sure this has her fingerprints all over it.
  • I'm not the brightest bulb on the block and that manifests it self as fear when I don't understand something. I am petrified of cancer and of some sort of sudden brain injury (my dad suffered many strokes before his death and my mom died of cancer). The author of the article probably has a couple of fears too. Couple that with his 'marching orders" which was probably something like "Write a doom and gloom article about the cyber-security risks to America's infrastructure for July 4th" and you get a super

  • The forthcoming cyberwar will be isolated to the Microsoft ecosystem, use of MS Windows attcking malware is almost a prerequisite in a large scale cyber attack. *nix OSes are fundamentally more resistant in practice, automated/self-replicating attacks.
  • The problem every politician faces is that without some mind-gripping fear, for which the politician has *The Answer*, it is hard to unseat an incumbent. Cyber warfare is the New Fear.

    Without the prospect of CYBER WARFARE, the critical infrastructure on which our political process takes place can remain controlled by private parties, some of whom are legitimately indifferent to the political process, even to the point where they are non-partisan, so long as the politician elect can be bought. This is c

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...