Go Back   Professional Soldiers ® > Area Studies > Asia

Reply
 
Thread Tools Display Modes
Old 11-19-2013, 22:09   #1
MtnGoat
Quiet Professional
 
MtnGoat's Avatar
 
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
Stuxnet Secret twin??

Somethings that make you go huummmm....

http://www.foreignpolicy.com/article...s_cyber_attack
__________________
"Berg Heil"

History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."

COLONEL BULL SIMONS

Intelligence failures are failures of command [just] as operations failures are command failures.”
MtnGoat is offline   Reply With Quote
Old 11-19-2013, 22:37   #2
PRB
Quiet Professional
 
PRB's Avatar
 
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
how about pasting that one...site wants a log in.
PRB is offline   Reply With Quote
Old 11-20-2013, 12:51   #3
perdurabo
Guerrilla
 
perdurabo's Avatar
 
Join Date: Nov 2008
Location: Pacific Northwest
Posts: 356
Quote:
Originally Posted by PRB View Post
how about pasting that one...site wants a log in.
Here's a sanitized link:

http://www.instapaper.com/text?u=htt...s_cyber_attack

Last edited by perdurabo; 11-20-2013 at 12:53.
perdurabo is offline   Reply With Quote
Old 11-20-2013, 14:04   #4
Badger52
Area Commander
 
Badger52's Avatar
 
Join Date: Jan 2011
Location: Western WI
Posts: 7,010
Thanks for posting.
Never Say Anything.
__________________
"Civil Wars don't start when a few guys hunt down a specific bastard. Civil Wars start when many guys hunt down the nearest bastards."

The coin paid to enforce words on parchment is blood; tyrants will not be stopped with anything less dear. - QP Peregrino
Badger52 is offline   Reply With Quote
Old 11-20-2013, 21:59   #5
PRB
Quiet Professional
 
PRB's Avatar
 
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
Interesting...wonder if it is on the mark.
PRB is offline   Reply With Quote
Old 11-21-2013, 07:40   #6
Trapper John
Quiet Professional
 
Trapper John's Avatar
 
Join Date: Nov 2012
Location: Harrisburg, PA
Posts: 3,836
Hmmmm....indeed!

If this is true, and I have no reason to believe it is not, then this revelation is a Game Changer.

This goes far beyond the impact of the Stuxnet revelation on military strategy IMO.

If Stuxnet is NSA derived, then, in light of the recent disclosure of the metadata collection efforts to monitor and track behavior of individuals and groups is nothing short of centralization of absolute power into fewer and fewer hands with little or no accountability.

I think the genie is out of the bottle.
__________________
Honor Above All Else
Trapper John is offline   Reply With Quote
Old 11-21-2013, 07:49   #7
MtnGoat
Quiet Professional
 
MtnGoat's Avatar
 
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
Quote:
Originally Posted by Trapper John View Post
Hmmmm....indeed!

If this is true, and I have no reason to believe it is not, then this revelation is a Game Changer.

This goes far beyond the impact of the Stuxnet revelation on military strategy IMO.

If Stuxnet is NSA derived, then, in light of the recent disclosure of the metadata collection efforts to monitor and track behavior of individuals and groups is nothing short of centralization of absolute power into fewer and fewer hands with little or no accountability.

I think the genie is out of the bottle.
John you hit it out of the ball park with your bottle thinking.
__________________
"Berg Heil"

History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."

COLONEL BULL SIMONS

Intelligence failures are failures of command [just] as operations failures are command failures.”
MtnGoat is offline   Reply With Quote
Old 11-21-2013, 19:44   #8
35NCO
Guerrilla
 
35NCO's Avatar
 
Join Date: Nov 2010
Location: CONUS
Posts: 403
Quote:
Originally Posted by Trapper John View Post

I think the genie is out of the bottle.
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.

Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist.
35NCO is offline   Reply With Quote
Old 11-21-2013, 20:23   #9
The Reaper
Quiet Professional
 
The Reaper's Avatar
 
Join Date: Jan 2004
Location: Free Pineland
Posts: 24,825
Quote:
Originally Posted by 35NCO View Post
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.

Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist.
I tend to concur, unless we have innoculated ourselves somehow with a defense, and I think that is highly unlikely.

TR
__________________
"It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat." - President Theodore Roosevelt, 1910

De Oppresso Liber 01/20/2025
The Reaper is offline   Reply With Quote
Old 11-22-2013, 09:58   #10
mugwump
Area Commander
 
Join Date: Nov 2005
Posts: 1,403
Quote:
Originally Posted by 35NCO View Post
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.

Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist.
The arms race has been on for years and only MAD keeps things in line. The subtext in the article is spot-on: Stuxnet demonstrates "do not mess with us because we can do worse to you." We are not being attacked by Iran, say, because their infrastructure would be laid waste in hours by a retaliatory SCADA attack and they know it. We are far ahead of the rest of the world in this arena.

Stuxnet is remarkable only because of it's sophistication and subtly. The first-phase attack was like re-setting 10,000 wristwatches to be seconds off without anyone noticing. And they're in a guarded room. And you do it several time per day. A SCADA infrastructure attack would be as subtle as smashing the wristwatches with a sledgehammer.

My bet for the first (MSM-publicized) attack involving fatalities: some script-kiddie malcontent out to go down in flames. If you're the first one to sell a tee-shirt with him wearing a Che beret you'll be able to retire in a week.
__________________
mugwump

“Klaatu barada nikto”
mugwump is offline   Reply With Quote
Old 11-22-2013, 12:57   #11
PRB
Quiet Professional
 
PRB's Avatar
 
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
PRB is offline   Reply With Quote
Old 11-22-2013, 15:16   #12
Badger52
Area Commander
 
Badger52's Avatar
 
Join Date: Jan 2011
Location: Western WI
Posts: 7,010
Quote:
Originally Posted by PRB View Post
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
If you travel/work in many of those regions & have ever left your laptop in your hotel unattended it's already theirs. I'm kinda old school, but this makes a case for some robust 'thing' you can have on your person at all times if you have to work that way. And then be prepared to discard it, with no remorse, for the never-connected device you have with what's of genuine value. Our big-ticket adversaries send their people to years-long university-grade programs just focusing on offensive cyberwar. As 35NCO said, it's when, not if.
__________________
"Civil Wars don't start when a few guys hunt down a specific bastard. Civil Wars start when many guys hunt down the nearest bastards."

The coin paid to enforce words on parchment is blood; tyrants will not be stopped with anything less dear. - QP Peregrino
Badger52 is offline   Reply With Quote
Old 11-22-2013, 17:26   #13
Flagg
Area Commander
 
Join Date: May 2011
Location: New Zealand
Posts: 1,423
Great article.

I wonder if the reported death of Mojtaba Ahmadi, Iran's reported cyber warfare commander, would be the first open source casualty in the crossover of cyber to kinetic warfare realms?

I'm sure it's no coincidence that the US announced that cyber attacks directed against the US may constitute use of force up through and including a nuclear response.

Which I reckon is a good idea considering Pandora's Box has clearly been opened with the Stuxnet point of reference.

I think it's easily within the realm of possibility that bad guys with exceptional strategic cyber bomb making talent will need to be hunted and targeted much like bad guys with exceptional tactical/operational IED bomb making talent.

I'm less worried about peer state versus near peer state cyber warfare due to MAD vulnerabilities than I am about a well resourced independent or proxy opponent with real talent.

The asymmetric nuclear threat is real, but it's threat to me personally and directly WAY down here is probably quite low.

But I would rate the likelihood of a cyber threat having a significant direct/indirect threat to my way of life due to the likelihood of it cascading around the world as possibly quite high.

Becoming aware of collection capabilities, opportunities, and vulnerabilities, when traveling thru/to the usual suspects, has led to changes in my use of technology.

Just my 0.02c
Flagg is offline   Reply With Quote
Old 11-23-2013, 05:51   #14
Gold Eagle
Guerrilla
 
Join Date: Sep 2010
Location: PA
Posts: 109
Quote:
Originally Posted by PRB View Post
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
I hope we don't find out the hard way.
Gold Eagle is offline   Reply With Quote
Old 11-23-2013, 08:38   #15
MtnGoat
Quiet Professional
 
MtnGoat's Avatar
 
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
I think between Iran and the Russian plants, shows a sign of the shift is the difference in infection methods of the two versions. The first Stuxnet had to be manually installed to controller systems at the facility by a knowing agent. This was a strong action and feat. While the second version was designed to self-replicate and spread through USB-drives and laptops of unwitting engineers. Now this was smart, witting and unwitting.
__________________
"Berg Heil"

History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."

COLONEL BULL SIMONS

Intelligence failures are failures of command [just] as operations failures are command failures.”
MtnGoat is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump



All times are GMT -6. The time now is 13:23.



Copyright 2004-2022 by Professional Soldiers ®
Site Designed, Maintained, & Hosted by Hilliker Technologies