Array
(
    [content] => 
    [params] => Array
        (
            [0] => /forum/index.php?threads/cyber-war-is-war.13420/
        )

    [addOns] => Array
        (
            [DL6/MLTP] => 13
            [Hampel/TimeZoneDebug] => 1000070
            [SV/ChangePostDate] => 2010200
            [SemiWiki/Newsletter] => 1000010
            [SemiWiki/WPMenu] => 1000010
            [SemiWiki/XPressExtend] => 1000010
            [ThemeHouse/XLink] => 1000970
            [ThemeHouse/XPress] => 1010570
            [XF] => 2021370
            [XFI] => 1050270
        )

    [wordpress] => /var/www/html
)

Cyber War is War

Arthur Hanson

Well-known member
It's way past time to treat cyber war for what it is, WAR. The US and others should seize assets to compensate or launch an all out cyber war. We also could exercise a military war by planting mines both on land or sea that would only deactivated when the criminal actions are stopped. Since most of these are sanctioned and promoted by the state, tariffs should be paid by that country and come of the selling price of their goods to be paid by their governments. Tolerating bad behavior has just led to ever increasing bad behavior, it must be treated as an act of war if even it is just tolerated or promoted by the government. These policies should be enacted by the US and its allies that are exposed to this ever increasingly bad and costly behavior otherwise it will continue to get worse if we continue to tolerate it.
 
Cybersecurity is a huge deal. If I worked for the CIA I would be nervous what may be on a hackable computer. It's happening to personal data and corporate ip.
 
The huge issue with cyber attacks is determining where they are coming from, because clever hackers spoof their IP addresses, making geographic tracing almost useless. A Chinese hacker can comment code using Russian to easily spoof the origins. Until you are 100% certain where the attacks are coming from, then any retribution is perilous.

There already is a Cybersecurity Agency, https://www.cisa.gov/cybersecurity
 
I'm sure there are corporations that didn't know they were hacked until a demand was made and then paid it.

This is really serious and something needs to be done.
 
The huge issue with cyber attacks is determining where they are coming from, because clever hackers spoof their IP addresses, making geographic tracing almost useless. A Chinese hacker can comment code using Russian to easily spoof the origins. Until you are 100% certain where the attacks are coming from, then any retribution is perilous.

There already is a Cybersecurity Agency, https://www.cisa.gov/cybersecurity
There are few true secrets any more and the half life of most is getting shorter every day. Harsh retaliation of proven perpetrators would be enough to discourage many, if not most. This is now serious war, with serious repercussions. Example, is I see a stolen design on a countries fighter jet or something similar, they are guilty whether they did it themselves or paid to have it done, either way they are guilty and deserve to suffer the consequences. Crypto currencies are going to present a whole new host of problems, just wait.
 
The huge issue with cyber attacks is determining where they are coming from, because clever hackers spoof their IP addresses, making geographic tracing almost useless. A Chinese hacker can comment code using Russian to easily spoof the origins. Until you are 100% certain where the attacks are coming from, then any retribution is perilous.

There already is a Cybersecurity Agency, https://www.cisa.gov/cybersecurity
A large scale hacking will trigger large scale truth finding efforts across multiple agencies and multiple countries. It's costly but totally achievable.

With the advance of AI, storage (including cloud storage), computing power (including cloud computing) and semiconductors, nothing is untraceable.
 
A large scale hacking will trigger large scale truth finding efforts across multiple agencies and multiple countries. It's costly but totally achievable.

With the advance of AI, storage (including cloud storage), computing power (including cloud computing) and semiconductors, nothing is untraceable.
On the contrary, complex and powerful systems provide the possibility of creating ever more complexity in hiding your tracks. And, the possible complexity for hiding grows faster than the size of the system (a consequence of combinatorial mathematics). So the issue is not whether the system is powerful enough to find miscreants, but whether it is set up to stop or track them well enough in the first instance.
 
It's way past time to treat cyber war for what it is, WAR. The US and others should seize assets to compensate or launch an all out cyber war. We also could exercise a military war by planting mines both on land or sea that would only deactivated when the criminal actions are stopped. Since most of these are sanctioned and promoted by the state, tariffs should be paid by that country and come of the selling price of their goods to be paid by their governments. Tolerating bad behavior has just led to ever increasing bad behavior, it must be treated as an act of war if even it is just tolerated or promoted by the government. These policies should be enacted by the US and its allies that are exposed to this ever increasingly bad and costly behavior otherwise it will continue to get worse if we continue to tolerate it.

US can't start a war even against an invasion of a military ally, and a fig leaf covered attempt to stage a coup in a NATO member. Would pentagon even scratch because somebody broke somebody's "computer videogame"
 
"So the issue is not whether the system is powerful enough to find miscreants, but whether it is set up to stop or track them well enough in the first instance."

The system today is still not good enough to block all hackings at the very first strike totally and completely, especially for an open society.

But today systems are good enough to identify and trace attacks afterwards or when the stakeholders learned the attack is happening.

One way the security experts like to do is quietly watching, logging, and following the attack along the path. It's very difficult to execute this good enough in the old days due to the limitation of computing power, storage space, and other network providers' capabilities. But it's doable today.

Sometimes people question why the authority are letting the attack hanging there a little longer instead of stopping them immediately. The reason is simple. They want to find out the attacker and the sponsor organization/country.
 
There are people that spent their careers around programming languages and can hack nearly everything. People need to consider what they keep on their computer.
 
Back
Top