FALSE:Cyberterror Not a Credible Threat
Cyberterror Not a
Credible Threat.
WRONG:G
"...militaries have not yet occurred and because most non-state actors have not yet acquired the necessary capabilities. As an aside, this last point undermines the notion of cyber terrorism. The alternative to the conclusion that terrorist groups currently lack the capabilities to launch a cyber attack is that they have these capabilities but have chosen not to use them. This alternative is nonsensical.
The “Korean” Cyber Attacks and Their Implications for Cyber Conflict
James A. Lewis
Center for Strategic and International Studies
October 2009
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
According to the paradigm James A.Lewis is using
is equivalent to declaring a sneak attack by the Japanese
is not a credible threat on December 6, 1941.
If the terrorist in China or Afpak were to hook up
with the Russian RBN, Russian Business net, or
a group of Chinese hackers they would have a
instant credible threat.
While the Russian Gov. does have some pull
with the RBN, both are profit and criminal
motivated.
The possibility exists,
the development of that capability is
just a mater of time in any case.
We won't post CBS, 60 Min.
videos, there are security risks,
they malfuction, leak and don't work
on many blogs.
link: MUCH WATCH:
?id=5578491n&tag=contentBody;housing
Paradigm Intel places it 3 yrs out
at the most.
Current Paradigm:
The opponents ARE there, conflicker, bazillion bots, RBN definitely has the capability.
Paradigm Intel places it 3 yrs out
at the most.
Even Thomas P.M. Barnett missed the working paradigm on this:
ARTICLE: U.S.A.F. Launches Major Technology Review, By Amy Butler,Aviation Week & Space Technology, Oct 21, 2009
True enough description:
"I don't think in the history of the Air Force we've been at a turning point like this. Maybe the closest was the Sputnik launch," Dahm tells Aviation Week. "What does the Air Force do when it is faced with a radically different future? Part of what it does is reach into its science and technology domain."
Amazing to think the USAF, only a few years ago, was going to rule all through the high-end definitions of net-centric warfare. Problem is, the Gap does not present such opponents.
(Thanks: Mike Nelson)
The opponents ARE there, conflicker, bazillion bots, RBN definitely has the capability.
The core does present these threats, and the Gap continues to exploit the core's
vulnerability with the core's own technology, Internet.
While the opponent is not there yet, they are seeking the technology.
We track the Hacker groups and there has been an definitive up tick in interest .
The terrorist have a history of importing core technologies to the GAP.
Gerald
Tactical Internet Systems analyst.
Labels: cyberwarfare, terrorist hacker threat, Warfare and Conflict
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home