Bet we haven’t given any serious thought to economic warfare, either. Economics 101 taught me that communism places the means of production in the hands of the people… What if those people are all in China?
Look we all know that hacking is serious now. Control systems hacks are the in thing at the moment, and what is cooler than hacking a 2000 pound mountain of steel and plastic that can barrel down the road at 100 miles per hour? They did it in SnowCrash, and Shadowrun, after all. The singularity must be nigh, right?
This article in the Daily Record suggests that the death of the journalist who exposed General McChrystal was engineered, per Richard Clarke. Now, I’m not generally the kind of guy who believes in ghost stories. Spooks in the wire are the kind of scary tales that con-goers hear each time they show up at B-Sides, heck, I use those kinds of stories to my advantage all of the time. I imagine it could happen, I know its possible. We saw Charlie Miller’s laptop demo on the Prius last year. So we all know its possible. But the idea that its being done actively feels like security theater. It feels like:
We’re going to take out journalists boys… Lets use an enormously advanced hack that will leave a lot more evidence and exposure to scrutiny, instead of simply screwing with his brakes, it will be good practice.
So, this is the ultimate Destroy attack. Assassination by computer. At least according to supposition from a former White House advisor. What do you think? Is this the next step in the “cyber-arms race?” Or, is it just speculation to sell newspapers?]]>
The Senate Armed Services Committee wants to get control of those pesky cyber weapons that are available for purchase by just about anyone by establishing an arms control regime along the lines of what’s done for missiles, tanks, and fighter jets.
via The U.S. Senate Wants to Control Malware Like It’s a Missile | Killer Apps.
According to John Reed, writer for the Killer Apps blog at ForeignPolicy.com, the U.S. tried this once before, with crypto, and the cipher punks had a field day with it.]]>
The article discusses how a company practically uses DLP solutions to reduce the risk associated with traditional computer crimes. The interesting item here is the statement that likens the company’s limitation on privacy to the plain view doctrine in law enforcement.]]>
It’s very hard to defend against this type of attacks. There are some cyber-security firms that are trying to develop new tools, new defense systems, but it’s hard. Interestingly enough, some of these companies are actually interested in hitting back, trying to go on the offense. I’ve been told of at least one bank that actively looked to buy cyber-weapons to use against the hackers, they didn’t get very far. That’s a very risky thing to do legally.
I wish I knew what bank that was…]]>