Internet Anthropologist Think Tank: FALSE:Cyberterror Not a Credible Threat

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Friday, October 30, 2009

    FALSE:Cyberterror Not a Credible Threat

    Cyberterror Not a

    Credible Threat.


    "...militaries have not yet occurred and because most non-state actors have not yet acquired the necessary capabilities. As an aside, this last point undermines the notion of cyber terrorism. The alternative to the conclusion that terrorist groups currently lack the capabilities to launch a cyber attack is that they have these capabilities but have chosen not to use them. This alternative is nonsensical.
    The “Korean” Cyber Attacks and Their Implications for Cyber Conflict
    James A. Lewis
    Center for Strategic and International Studies
    October 2009


    According to the paradigm James A.Lewis is using
    is equivalent to declaring a sneak attack by the Japanese
    is not a credible threat on December 6, 1941.

    If the terrorist in China or Afpak were to hook up
    with the Russian RBN, Russian Business net, or
    a group of Chinese hackers they would have a
    instant credible threat.

    While the Russian Gov. does have some pull
    with the RBN, both are profit and criminal

    The possibility exists,
    the development of that capability is
    just a mater of time in any case.

    We won't post CBS, 60 Min.
    videos, there are security risks,
    they malfuction, leak and don't work
    on many blogs.

    link: MUCH WATCH:

    Paradigm Intel places it 3 yrs out
    at the most.



    Even Thomas P.M. Barnett missed the working paradigm on this:

    ARTICLE: U.S.A.F. Launches Major Technology Review, By Amy Butler,Aviation Week & Space Technology, Oct 21, 2009

    True enough description:

    "I don't think in the history of the Air Force we've been at a turning point like this. Maybe the closest was the Sputnik launch," Dahm tells Aviation Week. "What does the Air Force do when it is faced with a radically different future? Part of what it does is reach into its science and technology domain."

    Amazing to think the USAF, only a few years ago, was going to rule all through the high-end definitions of net-centric warfare. Problem is, the Gap does not present such opponents.

    (Thanks: Mike Nelson)

    Current Paradigm:
    The opponents ARE there, conflicker, bazillion bots, RBN definitely has the capability.
    The core does present these threats, and the Gap continues to exploit the core's
    vulnerability with the core's own technology, Internet.
    While the opponent is not there yet, they are seeking the technology.
    We track the Hacker groups and there has been an definitive up tick in interest .
    The terrorist have a history of importing core technologies to the GAP.

    Tactical Internet Systems analyst.

    Labels: , ,


    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home