Cyber War misunderstood
Cyber WAR in the Air?
There is a lot of confusion about Cyber warfare
and just what it is.
- Ryan Singel just wrote a post
- Cyberwar Hype Intended to Destroy the Open Internet
Read More http://www.wired.com/threatlevel/2010/03/cyber-war-hype/#ixzz0h90eBtgv
His post reveals alot of the Confusion about terms
and definitions and how and what Cyber War is.
Cyber war and cyber crime are intertwined.
You can see how they build on each other.
Paradigm Intel points to the old
RBN Bussian Business Net in the
latest Google intrusion.
On the Bottom level we have phishers,
pushing fake security scans and
fake security software, my last count
was around 500 sites.
Then we have the Money launders,
scamming retailers and Ebay users,
And we have ID thieves, with key loggers
and scams to collect credit card info.
An American has their ID stolen
every 8 seconds.
And while credit reporting agencys
know about and see the ID theft they do nothing,
unless you pay them $10 a month for every
family member.
They see the Mortgage in your 8 year old
daughters name but they won't tell you about
it. They see it in all the data they collect about
you and sell for billions of dollars a year.
But the credit reporting agencys do not
have the integrity to tell the people they
collect credit info on that their ID has
been stolen.
The price of stolen IDs have come down
over the past 10 years because of the
ease of stealing IDs.
And then we have hackers doing the Banks
for hundreds of millions of dollars.
The FBI just reported the drop in physical
bank robberies. But the amount of the
thefts have rose to new all time highs.
And a step up from that are the guys that
walk through the best cyber security
in the USA, or any where in the world.
They walked into Google, ( and our paradigm
intel says, Micro soft ) the Department of Defense,
State Department and thousands of US corporations.
Just scooped up what they wanted.
They have even been into the computers of some
of the Top security vendors.
Stealing trade secrets and classified info.
Then we have " deniers" they deny access to
the Internet, in Georgia their DDos attacks
blocked people from some Government web sites.
And a few corporations have have been victims of
DDOS attacks.
Now here is where the Bot nets come in,
Using millions of zombie PCs to send out
emails to create sales and scams.
And Bot nets can do DDOS attacks also.
Which brings us to the Biggest Bot net.
Cornfliker, which the top minds in USA
has been working against for a year now.
And its still there.
Bots have it easy on the WWW as
Micro Soft refused to up date
illegal OS, where most bots live.
Confliker maybe big enough to attack the
13 internet nodes with forms of a DDOS
attacks to actually bring the WWW
While that would not be the goal of most
state actors it might be the goal of terrorist
and a few suicidal state nations.
And one of the goals in a cyber war would
be to cut off the other guy from the WWW
while leaving it up for the Rest of the world.
Or in defensive mode to take threats off the
net, crashing them or blocking them from
connecting.
Currently the terrorist top hackers are
under close observation and don't
pose a threat, but at some point
The terrorist are diligent working on acquiring
significant hacking capabilities.
Our BSU's see indications of it daily.
The law of unintended consequences
will play a big part in Cyber Warfare.
No one is sure how far into the worlds
infrastructures and cultures a shut down
of the WWW will extend.
We are just not certain.
To review :
There is NO privacy on the web,
However you may be able to hide among the
millions of surfers.
Every one is running NAKED.
There is no absolute security.
The technology exists to bring
down the WWW.
And keep it down.
The credit reporting agencys
are allowing financial rape of
the people they collect info on.
No one can tell who is attacking
and they can be, and remain invisible.
You have not been safe
and are not safe on the
WWW now.
Attacks are no longer targeted but are automated and target every thing.
Attacks are no longer targeted but are automated and target every thing.
An unremovable invisible rootkit, with stealth backdoors,
reading and copying everything.
Gerald
Internet Anthropologist
Tactical Internet Systems analyst.
( If I had $20 thousand I could move that
comprehension from Tactical to Strategic .G )
comprehension from Tactical to Strategic .G )
I've seen nothing in Einstein 1,2,3 to indicate
the technology to secure networks.
12 point secret cyber security plan.
http://news.yahoo.com/s/ap/20100302/
ap_on_go_pr_wh/us_obama_cyber
Our public cyber security plan.
Internet Anthropologist Think Tank: Cyber forces,authority, New pardigms.
Internet Anthropologist Think Tank:
Paradigm Intel: NEW Cyber WMD 2/03/2008 10:16:00 PM
Internet Anthropologist Think Tank:
CYBERWARS's Pearl Harbour 8/01/2007 01:14:00 PM
Internet Anthropologist Think Tank: Security Epidemic: SLQ INJECTION 5/22/2008 11:36:00 AM
Internet Anthropologist Think Tank: Infected PC's rampant 7/31/2008 01:32:00 AM
Internet Anthropologist Think Tank: Security:hyper endemic Epidemic: 6/09/2008 09:20:00 PM
the technology to secure networks.
12 point secret cyber security plan.
http://news.yahoo.com/s/ap/20100302/
ap_on_go_pr_wh/us_obama_cyber
Our public cyber security plan.
Internet Anthropologist Think Tank: Cyber forces,authority, New pardigms.
Internet Anthropologist Think Tank:
Paradigm Intel: NEW Cyber WMD 2/03/2008 10:16:00 PM
Internet Anthropologist Think Tank:
CYBERWARS's Pearl Harbour 8/01/2007 01:14:00 PM
Internet Anthropologist Think Tank: Security Epidemic: SLQ INJECTION 5/22/2008 11:36:00 AM
Internet Anthropologist Think Tank: Infected PC's rampant 7/31/2008 01:32:00 AM
Internet Anthropologist Think Tank: Security:hyper endemic Epidemic: 6/09/2008 09:20:00 PM
Labels: Cyber War misunderstood
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home