Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsThe Secret War
INFILTRATION. SABOTAGE. MAYHEM. FOR YEARS, FOUR-STAR GENERAL KEITH ALEXANDER HAS BEEN BUILDING A SECRET ARMY CAPABLE OF LAUNCHING DEVASTATING CYBERATTACKS. NOW ITS READY TO UNLEASH HELL.
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildingsthe city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
>SNIP<
Alexander runs the nations cyberwar efforts, an empire he has built over the past eight years by insisting that the USs inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the governments forefinger. What we see is an increasing level of activity on the networks, he said at a recent security conference in Canada. I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.
In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the USthe vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the militarys command and control structure, the dependence of the economy on the Internets smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.
But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversarys equipment and infrastructure, and potentially even to kill. Alexanderwho declined to be interviewed for this articlehas concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
http://www.wired.com/threatlevel/?p=58188
The pathalogicial paranoia of our country is unparalleled in the history of the world. We give our technology to other countries, so that later we can turn them into the "Enemy" we, in our psychos, need to function. We topple governments for short term gains, then later when they fail to do our bidding for whatever reason, we go to war with them. Blaming THEM for for the results of OUR actions, as the excuse for military action. Talk about your Sting Operations. We do it on a world scale. How long till the rest of the world gets tired of our meddling and pushes back?
Would it not make more sense to not be making enemies of the rest of the world in the first place? Trust has to be earned. Once gone, is very hard to regain. Where is the trust the rest of the world once had in us, US, The United States of America? For who do we trust? Like the pathologically paranoid, we trust no one, not even those we need to help us in our delusions.
1 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
The Secret War (Original Post)
RC
Jul 2013
OP
hedda_foil
(16,945 posts)1. This is the most important article I've read on cyberwarfare. James Bamford is the author. BIG knr
What Bamford exposes in real detail is f#@$ing terrifying. It's in Wired, and a must read. I think most DUers would like to know about the big-time venture capital backed cyber contractors called Endgame Systems that's an equal opportunity seller. It's willing and able to sell targeted exploits to any buyer with the bucks for a subscription to their services:
ENDGAME HUNTS FOR HIDDEN SECURITY WEAKNESSES THAT ARE RIPE FOR EXPLOITATION
According to Defense News C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clientsagencies like Cyber Command, the NSA, the CIA, and British intelligencea unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing whats called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Securitys No. 3 Research Institute, which is responsible for computer securityor simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies the equivalent of a back door left open.
Bonesaw also contains targeting data on US allies, and it is soon to be upgraded with a new version codenamed Velocity, according to C4ISR Journal. It will allow Endgames clients to observe in real time as hardware and software connected to the Internet around the world is added, removed, or changed. But such access doesnt come cheap. One leaked report indicated that annual subscriptions could run as high as $2.5 million for 25 zero-day exploits.
The buying and using of such a subscription by nation-states could be seen as an act of war. If you are engaged in reconnaissance on an adversarys systems, you are laying the electronic battlefield and preparing to use it, wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war. The question is, who else is on the secretive companys client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. It should be illegal, says the former senior intelligence official involved in cyberwarfare. I knew about Endgame when I was in intelligence. The intelligence community didnt like it, but theyre the largest consumer of that business.
Thus, in their willingness to pay top dollar for more and better zero-day exploits, the spy agencies are helping drive a lucrative, dangerous, and unregulated cyber arms race, one that has developed its own gray and black markets. The companies trading in this arena can sell their wares to the highest bidderbe they frontmen for criminal hacking groups or terrorist organizations or countries that bankroll terrorists, such as Iran. Ironically, having helped create thie market in zero-day exploits and then having launched the world into the era of cyberwar, Alexander now says the possibility of zero-day exploits falling into the wrong hands is his greatest worry.