Cyber Command Sissys?
How To Stop Cyber attacks: Diplomacy. Well, Maybe.
( NOPE, G )If you attended today’s still-unfolding big cybersecurity confab in Washington, sponsored by the Armed Forces Communications & Electronics Association, you heard a parade of military officers and Obama administration officials say — well, not a whole lot.
It’s hard to defend against a cyberattack… Everyone — civilian and military, public and private sector — needs to work together and pool resources and information… Incentivize cooperation… The supply chain is vulnerable… U.S. Cyber Command is developing integrated planning and operational frameworks…
And then there was Bruce Held.
Held is the Department of Energy’s intelligence chief and he said he spoke from the perspective of a longtime intel hand. His answer to the cybersecurity problem: diplomacy.
“A static cyber defense can never win against an agile cyber offense,” he told a panel...
Unleash the diplomats and prepare the economic sanctions packages, in other words, if you want to prevent your servers from getting fried. ( Yea thats working real well with Iran and its nuke program, G )
Brigadier General John Davis, the director of current operations for Cyber Command, said forthrightly during the same panel discussion that his “number-one challenge” was developing “situational awareness” of the cyberthreats that the U.S. faces.
SOURCE:
USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure freedom of action in cyberspace for the U.S. and its allies, and deny the same to adversaries.
The problems are not that difficult.
First you need rules of engagement.
If attacked you attack back, take the threat off line.
The technology exists to take bot farms off line
en mass.
The current politically correct Paradigm
excuses those with infected computers, zombie
PC's , if they attack. That some how it is ok
for their PC to do an attack if its infected
with a Bot, they are not at fault as someone
else has taken over their PC with a Bot.
An some how that makes them innocent
and immune from consequences if
their PC attacks some one?
They are responsible for the security
of their PC, if it attacks then:
under the principle of self defense
we can return the attack, Take them
off line for an hour, produce a pop up
on their system that says this PC atacked
and has been taken off line for an hour, and
bot and root kit cleaners can be down loaded
at XYZ web site.
Taking out a bot farm may take down
100,000 American PC's.Temporally.
But the owners would also clean
them up also. Taking out most
of that bot farm.
We have a legal right to self defense.
It would be legal to take them off line.
Micro Softs paradigm is cockeyed too.
They block security updates if the
OS isn't legit.
That becomes problematic when that
policy turns the illegal unpatched
OS into weapons for bots.
That policy makes the internet
unsafe for the rest of us.
Getting all those systems patched
and bots and rootkits removed,
cleaned up will cut way down
on the number of bots wild on the
WWW.
And it means if a bot farm
attacks they will loose their
bots.
We have seen a couple indications of the system
to take down bot farms has been deployed.
Second is real time penetration during the attack.
Google has demonstrated this concept during its hack.
They didn't take it far enough, it includes penetrating
the proxys during the attack to get originating IP of the attack.
Bots are different just take them off line.
Proof of concept.
Interview with Cyber Warrior
They have COWs ( Cyber Over Watch ) in place, and are adding more,
a early warning system for cyber attacks.
US Government to deploy COWS.
http://warintel.blogspot.com/2010/02/dont-have-cow-man-cyber-over-watch.html
The US Government can't harden civilian net works, but
they can monitor attack activity on a huge spectrum,
and engage their cyber forces to take the treat off line.
Even swap IP's to put armed cyber forces between the
attackers and the targets.
But there are no rules of engagement so far.
It takes an OK from Obama to take a server
off line now.
Cyber Wars and attacks happen in seconds
if you are handicapped by having to make
phone calls to get permission you will loose.
The technology is there to KICK ASS,
and USCYBERCOM has it, and the brains
to win, give them the power to use it,
and take the threats off line, Cyber Command
just need rules of engagement and the will
to police the bad guys.
Their capabilities are awesome.
There are NO Cyber Command Sissys.
They are one of the most powerful
forces in the WORLD.
Turn them loose.
Gerald
Anthropologist
Tactical Internet Systems analyst
OUR SEMINAR
.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home