11-19-2013, 22:09
|
#1
|
|
Quiet Professional
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
|
Stuxnet Secret twin??
__________________
"Berg Heil"
History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."
COLONEL BULL SIMONS
Intelligence failures are failures of command [just] as operations failures are command failures.”
|
|
MtnGoat is offline
|
|
11-19-2013, 22:37
|
#2
|
|
Quiet Professional
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
|
how about pasting that one...site wants a log in.
|
|
PRB is offline
|
|
11-20-2013, 12:51
|
#3
|
|
Guerrilla
Join Date: Nov 2008
Location: Pacific Northwest
Posts: 356
|
Quote:
Originally Posted by PRB
how about pasting that one...site wants a log in.
|
Here's a sanitized link:
http://www.instapaper.com/text?u=htt...s_cyber_attack
Last edited by perdurabo; 11-20-2013 at 12:53.
|
|
perdurabo is offline
|
|
11-20-2013, 14:04
|
#4
|
|
Area Commander
Join Date: Jan 2011
Location: Western WI
Posts: 7,010
|
Thanks for posting.
Never Say Anything.
__________________
"Civil Wars don't start when a few guys hunt down a specific bastard. Civil Wars start when many guys hunt down the nearest bastards."
The coin paid to enforce words on parchment is blood; tyrants will not be stopped with anything less dear. - QP Peregrino
|
|
Badger52 is offline
|
|
11-20-2013, 21:59
|
#5
|
|
Quiet Professional
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
|
Interesting...wonder if it is on the mark.
|
|
PRB is offline
|
|
11-21-2013, 07:40
|
#6
|
|
Quiet Professional
Join Date: Nov 2012
Location: Harrisburg, PA
Posts: 3,836
|
Hmmmm....indeed!
If this is true, and I have no reason to believe it is not, then this revelation is a Game Changer.
This goes far beyond the impact of the Stuxnet revelation on military strategy IMO.
If Stuxnet is NSA derived, then, in light of the recent disclosure of the metadata collection efforts to monitor and track behavior of individuals and groups is nothing short of centralization of absolute power into fewer and fewer hands with little or no accountability.
I think the genie is out of the bottle.
__________________
Honor Above All Else
|
|
Trapper John is offline
|
|
11-21-2013, 07:49
|
#7
|
|
Quiet Professional
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
|
Quote:
Originally Posted by Trapper John
Hmmmm....indeed!
If this is true, and I have no reason to believe it is not, then this revelation is a Game Changer.
This goes far beyond the impact of the Stuxnet revelation on military strategy IMO.
If Stuxnet is NSA derived, then, in light of the recent disclosure of the metadata collection efforts to monitor and track behavior of individuals and groups is nothing short of centralization of absolute power into fewer and fewer hands with little or no accountability.
I think the genie is out of the bottle. 
|
John you hit it out of the ball park with your bottle thinking.
__________________
"Berg Heil"
History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."
COLONEL BULL SIMONS
Intelligence failures are failures of command [just] as operations failures are command failures.”
|
|
MtnGoat is offline
|
|
11-21-2013, 19:44
|
#8
|
|
Guerrilla
Join Date: Nov 2010
Location: CONUS
Posts: 403
|
Quote:
Originally Posted by Trapper John
I think the genie is out of the bottle. 
|
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.
Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist.
|
|
35NCO is offline
|
|
11-21-2013, 20:23
|
#9
|
|
Quiet Professional
Join Date: Jan 2004
Location: Free Pineland
Posts: 24,825
|
Quote:
Originally Posted by 35NCO
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.
Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist. 
|
I tend to concur, unless we have innoculated ourselves somehow with a defense, and I think that is highly unlikely.
TR
__________________
"It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat." - President Theodore Roosevelt, 1910
De Oppresso Liber 01/20/2025
|
|
The Reaper is offline
|
|
11-22-2013, 09:58
|
#10
|
|
Area Commander
Join Date: Nov 2005
Posts: 1,403
|
Quote:
Originally Posted by 35NCO
The genie problem is that the code for how it was done is now into the wild to be reverse engineered for a long time to come. It wont be long before we see it here gentlemen. I can promise someone will be hitting us very soon in such a manner. The ONLY thing that stops this currently is strategic timing of the attack. For some reason it is not useful now to our adversary's otherwise it would have already happened. Perhaps they are having too much enjoyment in watching our current political failures.
Whats about to happen will be the new nuclear arms race of our very near new future. Once there is a strike, it will be an act of war. Then the whole internet will explode with counter strikes. Its only takes one good hit to create the tipping point that spirals it all into oblivion. I strongly disagree with the author. I do not believe the code getting out in to the wild was intentional. If it was, it very well may have been the most dangerous leadership decision in warfare for generations to come and to those that may not longer exist. 
|
The arms race has been on for years and only MAD keeps things in line. The subtext in the article is spot-on: Stuxnet demonstrates "do not mess with us because we can do worse to you." We are not being attacked by Iran, say, because their infrastructure would be laid waste in hours by a retaliatory SCADA attack and they know it. We are far ahead of the rest of the world in this arena.
Stuxnet is remarkable only because of it's sophistication and subtly. The first-phase attack was like re-setting 10,000 wristwatches to be seconds off without anyone noticing. And they're in a guarded room. And you do it several time per day. A SCADA infrastructure attack would be as subtle as smashing the wristwatches with a sledgehammer.
My bet for the first (MSM-publicized) attack involving fatalities: some script-kiddie malcontent out to go down in flames. If you're the first one to sell a tee-shirt with him wearing a Che beret you'll be able to retire in a week.
__________________
mugwump
“Klaatu barada nikto”
|
|
mugwump is offline
|
|
11-22-2013, 12:57
|
#11
|
|
Quiet Professional
Join Date: Mar 2009
Location: Arizona
Posts: 5,327
|
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
|
|
PRB is offline
|
|
11-22-2013, 15:16
|
#12
|
|
Area Commander
Join Date: Jan 2011
Location: Western WI
Posts: 7,010
|
Quote:
Originally Posted by PRB
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
|
If you travel/work in many of those regions & have ever left your laptop in your hotel unattended it's already theirs. I'm kinda old school, but this makes a case for some robust 'thing' you can have on your person at all times if you have to work that way. And then be prepared to discard it, with no remorse, for the never-connected device you have with what's of genuine value. Our big-ticket adversaries send their people to years-long university-grade programs just focusing on offensive cyberwar. As 35NCO said, it's when, not if.
__________________
"Civil Wars don't start when a few guys hunt down a specific bastard. Civil Wars start when many guys hunt down the nearest bastards."
The coin paid to enforce words on parchment is blood; tyrants will not be stopped with anything less dear. - QP Peregrino
|
|
Badger52 is offline
|
|
11-22-2013, 17:26
|
#13
|
|
Area Commander
Join Date: May 2011
Location: New Zealand
Posts: 1,423
|
Great article.
I wonder if the reported death of Mojtaba Ahmadi, Iran's reported cyber warfare commander, would be the first open source casualty in the crossover of cyber to kinetic warfare realms?
I'm sure it's no coincidence that the US announced that cyber attacks directed against the US may constitute use of force up through and including a nuclear response.
Which I reckon is a good idea considering Pandora's Box has clearly been opened with the Stuxnet point of reference.
I think it's easily within the realm of possibility that bad guys with exceptional strategic cyber bomb making talent will need to be hunted and targeted much like bad guys with exceptional tactical/operational IED bomb making talent.
I'm less worried about peer state versus near peer state cyber warfare due to MAD vulnerabilities than I am about a well resourced independent or proxy opponent with real talent.
The asymmetric nuclear threat is real, but it's threat to me personally and directly WAY down here is probably quite low.
But I would rate the likelihood of a cyber threat having a significant direct/indirect threat to my way of life due to the likelihood of it cascading around the world as possibly quite high.
Becoming aware of collection capabilities, opportunities, and vulnerabilities, when traveling thru/to the usual suspects, has led to changes in my use of technology.
Just my 0.02c
|
|
Flagg is offline
|
|
11-23-2013, 05:51
|
#14
|
|
Guerrilla
Join Date: Sep 2010
Location: PA
Posts: 109
|
Quote:
Originally Posted by PRB
I wonder how many 'sleeping' virus's exist in the US. All of the businessmen that travel/work in China using their systems and then plug in their devices back home.
|
I hope we don't find out the hard way.
|
|
Gold Eagle is offline
|
|
11-23-2013, 08:38
|
#15
|
|
Quiet Professional
Join Date: Feb 2006
Location: Asscrackistan
Posts: 4,289
|
I think between Iran and the Russian plants, shows a sign of the shift is the difference in infection methods of the two versions. The first Stuxnet had to be manually installed to controller systems at the facility by a knowing agent. This was a strong action and feat. While the second version was designed to self-replicate and spread through USB-drives and laptops of unwitting engineers. Now this was smart, witting and unwitting.
__________________
"Berg Heil"
History teaches that when you become indifferent and lose the will to fight someone who has the will to fight will take over."
COLONEL BULL SIMONS
Intelligence failures are failures of command [just] as operations failures are command failures.”
|
|
MtnGoat is offline
|
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
|
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
All times are GMT -6. The time now is 13:23.
|
|
|