![]() |
Stuxnet Secret twin??
|
how about pasting that one...site wants a log in.
|
Quote:
http://www.instapaper.com/text?u=htt...s_cyber_attack |
Thanks for posting.
Never Say Anything. |
Interesting...wonder if it is on the mark.
|
Hmmmm....indeed!
If this is true, and I have no reason to believe it is not, then this revelation is a Game Changer. This goes far beyond the impact of the Stuxnet revelation on military strategy IMO. If Stuxnet is NSA derived, then, in light of the recent disclosure of the metadata collection efforts to monitor and track behavior of individuals and groups is nothing short of centralization of absolute power into fewer and fewer hands with little or no accountability. I think the genie is out of the bottle. :eek: |
Quote:
|
Quote:
Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist. :munchin |
Quote:
TR |
Quote:
Stuxnet is remarkable only because of it's sophistication and subtly. The first-phase attack was like re-setting 10,000 wristwatches to be seconds off without anyone noticing. And they're in a guarded room. And you do it several time per day. A SCADA infrastructure attack would be as subtle as smashing the wristwatches with a sledgehammer. My bet for the first (MSM-publicized) attack involving fatalities: some script-kiddie malcontent out to go down in flames. If you're the first one to sell a tee-shirt with him wearing a Che beret you'll be able to retire in a week. |
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
|
Quote:
|
Great article.
I wonder if the reported death of Mojtaba Ahmadi, Iran's reported cyber warfare commander, would be the first open source casualty in the crossover of cyber to kinetic warfare realms? I'm sure it's no coincidence that the US announced that cyber attacks directed against the US may constitute use of force up through and including a nuclear response. Which I reckon is a good idea considering Pandora's Box has clearly been opened with the Stuxnet point of reference. I think it's easily within the realm of possibility that bad guys with exceptional strategic cyber bomb making talent will need to be hunted and targeted much like bad guys with exceptional tactical/operational IED bomb making talent. I'm less worried about peer state versus near peer state cyber warfare due to MAD vulnerabilities than I am about a well resourced independent or proxy opponent with real talent. The asymmetric nuclear threat is real, but it's threat to me personally and directly WAY down here is probably quite low. But I would rate the likelihood of a cyber threat having a significant direct/indirect threat to my way of life due to the likelihood of it cascading around the world as possibly quite high. Becoming aware of collection capabilities, opportunities, and vulnerabilities, when traveling thru/to the usual suspects, has led to changes in my use of technology. Just my 0.02c |
Quote:
|
I think between Iran and the Russian plants, shows a sign of the shift is the difference in infection methods of the two versions. The first Stuxnet had to be manually installed to controller systems at the facility by a knowing agent. This was a strong action and feat. While the second version was designed to self-replicate and spread through USB-drives and laptops of unwitting engineers. Now this was smart, witting and unwitting.
|
| All times are GMT -6. The time now is 15:34. |
Copyright 2004-2022 by Professional Soldiers ®