Re: [iwar] * JAPAN is preparing to use electronic weapons to destroy (fwd)


From: Tony Bartoletti
From: azb@llnl.gov
To: iwar@egroups.com

Fri, 27 Oct 2000 13:55:56 -0700


fc  Fri Oct 27 13:56:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 27 Oct 2000 13:56:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Oct 27 20:56:08 2000)
X-From_: sentto-279987-711-972680081-fc=all.net@returns.onelist.com  Fri Oct 27 15:54:38 2000
Received: from hp.egroups.com (hp.egroups.com [208.50.99.201]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id PAA16405 for ; Fri, 27 Oct 2000 15:54:38 -0500
X-eGroups-Return: sentto-279987-711-972680081-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hp.egroups.com with NNFMP; 27 Oct 2000 20:54:41 -0000
X-Sender: azb@llnl.gov
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_2_1); 27 Oct 2000 20:54:40 -0000
Received: (qmail 15460 invoked from network); 27 Oct 2000 20:54:40 -0000
Received: from unknown (10.1.10.27) by m2.onelist.org with QMQP; 27 Oct 2000 20:54:40 -0000
Received: from unknown (HELO poptop.llnl.gov) (128.115.41.70) by mta2 with SMTP; 27 Oct 2000 20:54:40 -0000
Received: from catalyst (catalyst.llnl.gov [128.115.222.68]) by poptop.llnl.gov (8.8.8/LLNL-3.0.2/pop.llnl.gov-5.1) with ESMTP id NAA11936 for ; Fri, 27 Oct 2000 13:54:39 -0700 (PDT)
Message-Id: <4.2.2.20001027132908.00bad380@poptop.llnl.gov>
X-Sender: e048786@poptop.llnl.gov
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 
To: iwar@egroups.com
In-Reply-To: 
References: <4.2.2.20001027105204.00a99220@poptop.llnl.gov>
From: Tony Bartoletti 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 27 Oct 2000 13:55:56 -0700
Reply-To: iwar@egroups.com
Subject: Re: [iwar] * JAPAN is preparing to use electronic weapons to destroy (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

At 11:53 AM 10/27/00 -0700, you wrote:
>Tony, what are we going to do with you?  Aren't you a realist?

:)

>In the world of political operations, it's not about hitting the right target,
>it's about the amount of noise you make.

Indeed.  Since people of intelligence (hackers included) can easily see the
futility of such an approach, one must assume the announcement to target a
naive populace for funding support.  I hope they put the money to good use.

>In the world of field operators, we spend a lot of time to make certain we've
>got the right target, but that's not a popular approach.
>
>The JDA comments sound like much smoke and little fire.  This is what happens
>when Those In Charge have no idea about what to really do--they opt for
>reprisal.  Which morphs into escalation.
>
>MW

Agreed.  I also think that the public needs a better understanding
of the force-multipliers involved in potential cyber-attack events.

Ignoring the difficulty of accurate target identification, suppose
that an accurate "traceback" through unwitting compromised systems
could lead quickly to the "source machine" originating the attack.
I envision a massive cyber-attack on a nation-state whose "cyber-
reaction squad" is so effective at accurate identification and
response that they succeed in "destroying the attacking computer"
(an abandoned PC in an abandoned apartment rented under an assumed
name.)  Quite the victory (sigh).

One part of me hopes that by rejecting all of the "silly" solutions,
a good cyber-defense capability will emerge through a process of
elimination.  (And then, I woke up :)

___tony___


>On Fri, 27 Oct 2000, Tony Bartoletti wrote:
>
> > At 06:59 AM 10/27/00 -0700, you wrote:
> > >By Juliet Hindell in Tokyo
> > >Tuesday 24 October 2000
> > >
> > >JAPAN is preparing to use electronic weapons to destroy the computers
> > >of hackers trying to infiltrate the country's defence systems. The
> > >move follows raids on government computer systems.
> > >
> > >The Japan Defence Agency is expected to deploy the "cyber squad".
> > >Leading computer experts will design software which will be capable of
> > >launching anti-hacking and anti-virus attacks.
> >
> >
> > This "ability" sounds threatening, but must surely be so tightly proscribed
> > as to be almost insignificant.  If dedicated hackers were to jump though
> > several compromised machines in various countries, place "time bombs" in
> > (say) a set of NASA computers, do a reasonable job of wiping their trail,
> > and several weeks later these "bombs" launch an attack on Japan's defense
> > systems, I seriously doubt that a JDA "cyber squad" will respond by
> > destroying the offending NASA computers.
> >
> > The need to verify that the offending systems are not themselves victims
> > of the originating crime will (I assume) act to curtail most of these
> > envisioned "rapid response" activities.
> >
> > Otherwise, we create a huge electronic tinderbox, each "rapid response"
> > misperceived to be a malicious attack inviting further rapid response.




Tony Bartoletti 925-422-3881 
Information Operations, Warfare and Assurance Center
Lawrence Livermore National Laboratory
Livermore, CA 94551-9900


-------------------------- eGroups Sponsor -------------------------~-~>
eGroups eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9698/14/_/595019/_/972680081/
---------------------------------------------------------------------_->

------------------
http://all.net/