1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

Cyber Attacks

Discussion in 'BBS Hangout: Debate & Discussion' started by rocketsjudoka, Jun 1, 2012.

  1. rocketsjudoka

    rocketsjudoka Member
    Supporting Member

    Joined:
    Jul 24, 2007
    Messages:
    58,084
    Likes Received:
    48,152
    This is an interesting NYT article about cyber attacks and how the program started under the last admin as a compromise on how to attack Iran and has continued under the current. In some ways it parallels the drone strike program in that it was a covert alternative to more direct military strikes and was also one of the very questionable GW Bush programs that Obama embraced.

    http://www.msnbc.msn.com/id/47641889/ns/world_news-the_new_york_times/#.T8iyzVKTUsI

    It is fairly long so am just posting the first few paragraphs. The rest at the link.

    Obama order sped up wave of cyberattacks against Iran
    Internal Obama administration estimates say sabotage program slowed Iran's progress toward developing the ability to build nuclear weapons by 18 months to 2 years

    WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

    Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

    At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

    “Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

    Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.
    Video: Inside an Iranian nuclear research facility

    This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.
     
  2. LonghornFan

    LonghornFan Member

    Joined:
    Sep 16, 2002
    Messages:
    15,718
    Likes Received:
    2,628
    So...whose going to whine when this comes back on us? Scary ****, new kind of war.
     
  3. Space Ghost

    Space Ghost Member

    Joined:
    Feb 14, 1999
    Messages:
    17,092
    Likes Received:
    8,029
    With lots of regulations to follow to "protect" us.
     
    1 person likes this.
  4. bigtexxx

    bigtexxx Member

    Joined:
    Jun 12, 2002
    Messages:
    26,965
    Likes Received:
    2,347
    I use Adaware as well as Symantec

    come at me, mullahs
     
  5. Rocket River

    Rocket River Member

    Joined:
    Oct 5, 1999
    Messages:
    63,398
    Likes Received:
    30,816
    Would attacks on our computer systems be considered an Act of War?
    Violation of our Sovereignty?

    Rocket River
     
  6. rocketsjudoka

    rocketsjudoka Member
    Supporting Member

    Joined:
    Jul 24, 2007
    Messages:
    58,084
    Likes Received:
    48,152
    I think that is a complete gray area right now and might depend on what sort of attack. For instance something that is designed to slow down our communications might not be but an attack that is meant to cause nuclear reactors to melt down might.
     
  7. gwayneco

    gwayneco Contributing Member

    Joined:
    Feb 6, 2000
    Messages:
    3,459
    Likes Received:
    36
    So, the man who never lets an opportunity to bash his predecessor is once again following the same policy of that oft maligned predecessor.
     
  8. MoonDogg

    MoonDogg Member

    Joined:
    Nov 12, 1999
    Messages:
    5,167
    Likes Received:
    495
    [​IMG]
     
    1 person likes this.
  9. WNBA

    WNBA Member

    Joined:
    Jul 15, 2002
    Messages:
    5,365
    Likes Received:
    404
    USA = terrorism.
     
  10. rezdawg

    rezdawg Member

    Joined:
    Feb 15, 2000
    Messages:
    18,351
    Likes Received:
    1,148
    The world police strikes again.
     
  11. Kyakko

    Kyakko Member

    Joined:
    Aug 15, 2002
    Messages:
    2,161
    Likes Received:
    39
    Every major nation does it. Most use hacking as a spying tool. Its naive to think there is a higher ground. Im usually with the school that its better to screw w other countries than vice versa, and that includes europe. My problem is when/if it carries over to US citizens
     
  12. Hightop

    Hightop Member

    Joined:
    Oct 15, 2011
    Messages:
    1,257
    Likes Received:
    69
    So has war with Iran begun?

    Cyber Combat: Act of War

    Pentagon Sets Stage for U.S. to Respond to Computer Sabotage With Military Force

    http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html

    By SIOBHAN GORMAN And JULIAN E. BARNES

    WASHINGTON—The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.

    The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military.

    In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.

    Recent attacks on the Pentagon's own systems—as well as the sabotaging of Iran's nuclear program via the Stuxnet computer worm—have given new urgency to U.S. efforts to develop a more formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military computer system was penetrated. This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.

    The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.

    One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation


    The Pentagon's document runs about 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict—derived from various treaties and customs that, over the years, have come to guide the conduct of war and proportionality of response—apply in cyberspace as in traditional warfare, according to three defense officials who have read the document. The document goes on to describe the Defense Department's dependence on information technology and why it must forge partnerships with other nations and private industry to protect infrastructure.

    The strategy will also state the importance of synchronizing U.S. cyber-war doctrine with that of its allies, and will set out principles for new security policies. The North Atlantic Treaty Organization took an initial step last year when it decided that, in the event of a cyber attack on an ally, it would convene a group to "consult together" on the attacks, but they wouldn't be required to help each other respond. The group hasn't yet met to confer on a cyber incident.

    Pentagon officials believe the most-sophisticated computer attacks require the resources of a government. For instance, the weapons used in a major technological assault, such as taking down a power grid, would likely have been developed with state support, Pentagon officials say.

    The move to formalize the Pentagon's thinking was borne of the military's realization the U.S. has been slow to build up defenses against these kinds of attacks, even as civilian and military infrastructure has grown more dependent on the Internet. The military established a new command last year, headed by the director of the National Security Agency, to consolidate military network security and attack efforts.

    The Pentagon itself was rattled by the 2008 attack, a breach significant enough that the Chairman of the Joint Chiefs briefed then-President George W. Bush. At the time, Pentagon officials said they believed the attack originated in Russia, although didn't say whether they believed the attacks were connected to the government. Russia has denied involvement.

    The Rules of Armed Conflict that guide traditional wars are derived from a series of international treaties, such as the Geneva Conventions, as well as practices that the U.S. and other nations consider customary international law. But cyber warfare isn't covered by existing treaties. So military officials say they want to seek a consensus among allies about how to proceed.

    "Act of war" is a political phrase, not a legal term, said Charles Dunlap, a retired Air Force Major General and professor at Duke University law school. Gen. Dunlap argues cyber attacks that have a violent effect are the legal equivalent of armed attacks, or what the military calls a "use of force."

    "A cyber attack is governed by basically the same rules as any other kind of attack if the effects of it are essentially the same," Gen. Dunlap said Monday. The U.S. would need to show that the cyber weapon used had an effect that was the equivalent of a conventional attack.

    James Lewis, a computer-security specialist at the Center for Strategic and International Studies who has advised the Obama administration, said Pentagon officials are currently figuring out what kind of cyber attack would constitute a use of force. Many military planners believe the trigger for retaliation should be the amount of damage—actual or attempted—caused by the attack.

    For instance, if computer sabotage shut down as much commerce as would a naval blockade, it could be considered an act of war that justifies retaliation, Mr. Lewis said. Gauges would include "death, damage, destruction or a high level of disruption" he said.

    Culpability, military planners argue in internal Pentagon debates, depends on the degree to which the attack, or the weapons themselves, can be linked to a foreign government. That's a tricky prospect at the best of times.

    The brief 2008 war between Russia and Georgia included a cyber attack that disrupted the websites of Georgian government agencies and financial institutions. The damage wasn't permanent but did disrupt communication early in the war.

    A subsequent NATO study said it was too hard to apply the laws of armed conflict to that cyber attack because both the perpetrator and impact were unclear. At the time, Georgia blamed its neighbor, Russia, which denied any involvement.

    Much also remains unknown about one of the best-known cyber weapons, the Stuxnet computer virus that sabotaged some of Iran's nuclear centrifuges. While some experts suspect it was an Israeli attack, because of coding characteristics, possibly with American assistance, that hasn't been proven. Iran was the location of only 60% of the infections, according to a study by the computer security firm Symantec. Other locations included Indonesia, India, Pakistan and the U.S.

    Officials from Israel and the U.S. have declined to comment on the allegations.

    Defense officials refuse to discuss potential cyber adversaries, although military and intelligence officials say they have identified previous attacks originating in Russia and China. A 2009 government-sponsored report from the U.S.-China Economic and Security Review Commission said that China's People's Liberation Army has its own computer warriors, the equivalent of the American National Security Agency.

    That's why military planners believe the best way to deter major attacks is to hold countries that build cyber weapons responsible for their use. A parallel, outside experts say, is the George W. Bush administration's policy of holding foreign governments accountable for harboring terrorist organizations, a policy that led to the U.S. military campaign to oust the Taliban from power in Afghanistan.

    Write to Siobhan Gorman at siobhan.gorman@wsj.com
     
  13. Commodore

    Commodore Member

    Joined:
    Dec 15, 2007
    Messages:
    33,018
    Likes Received:
    16,957
    Unbelievable that the administration is leaking national security info to the NYTimes.

    People need to be prosecuted and thrown in prison for this crap (not the journalists, the leakers). I don't think anyone was ever prosecuted for the leaking of the bank tracking program or the warrant-less surveillance program. The difference here is I would bet the administration leaked this intentionally to spike the football, whereas those other instances the government specifically asked the Times not to print the story.

    As someone who possesses a security clearance, reading this makes me violently angry. The amount of time and effort and care we take to protect information, and this stuff just gets blabbed to the Times like its no big deal.

    We should have no knowledge of Stuxnet, zero.
     
    1 person likes this.
  14. Invisible Fan

    Invisible Fan Member

    Joined:
    Dec 5, 2001
    Messages:
    45,195
    Likes Received:
    27,120
    Every nation does it. I'd prefer it to be on the down low than some idiot braggadocio general gloating over it.
     

Share This Page

  • About ClutchFans

    Since 1996, ClutchFans has been loud and proud covering the Houston Rockets, helping set an industry standard for team fan sites. The forums have been a home for Houston sports fans as well as basketball fanatics around the globe.

  • Support ClutchFans!

    If you find that ClutchFans is a valuable resource for you, please consider becoming a Supporting Member. Supporting Members can upload photos and attachments directly to their posts, customize their user title and more. Gold Supporters see zero ads!


    Upgrade Now