US, China Face Mutually Assured Destruction In Cyberwar 110
chicksdaddy writes with a tidbit from the RSA conference. From the article: "A panel of security and policy experts speaking at the RSA Conference in San Francisco on Wednesday said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk of an all-out cyberwar is remote, and that the U.S. still holds many of the cards. Rather than trying to deliver a knock-out cyberwar capability, the U.S. should embrace the Cold War notions of containment and mutually assured destruction with advanced nations like China and Russia. Tried and true methods to win security from cyberattacks include international diplomacy, multilateral agreements that clarify the parameters for peaceful and hostile cyberactions and — of course — a strong offensive capability."
In My Opinion, One Horrible Analogy (Score:5, Insightful)
Old fashioned diplomatic horse trading will also be a critical tool for avoiding conflict and stemming the kinds of economic and military espionage that have become common in recent years.
As I stated above, I feel that the "economic and military espionage" is largely coming from one or two perpetrators. China will simply agree to everything, take the bargaining chip (whatever it is) from the US and then continue to play dumb.
In fact, the country's leaders are anxious to hear the opinions of U.S. policy experts on what an effective cyber war doctrine and policy should look like.
Right, right, "Excuse me, what are the rules so I know how to toe the line but still remain in good standing with the UN ... er, screw them, the WTO?"
This gem was really humorous:
"We as a nation know what steps we need to take to reduce our risk in cyber space," said Lewis of CSIS. "We may not want to, politically, but we know what those steps are."
A hot topic of conversation now within policy circles, cyber war is likely to end up as just another weapon in the arsenal of the U.S., China and other advanced nations, said Lewis. "People will figure out how to use it."
People will figure out how to use it? Now get off your lawn? Buddy if you can't take the time to pick up the paper or turn on CNN and watch 15-year olds downloading point'n'click bots to be a part of Anonymous, you don't deserve the title of "Senior Fellow at the Center for Strategic and International Studies." Let me assure you, people do know how to use it. Ragtag groups of teenagers roving the globe can band together and effectively use it. I'm sure governments aren't as ignorantly bumbling to catch up like they want us to believe.
Re: (Score:2)
I'm sure governments aren't as ignorantly bumbling to catch up like they want us to believe.
Of course not. But publicizing the domestic use of drones over U.S. cities and Jay Rockefeller going balls-out to stifle internet free speech doesn't make for particularly good press. So they do this instead; it worked wonders for George Bush, Jr.'s career. Why mess with perfection?
Re: (Score:2, Insightful)
"it worked wonders for George Bush, Jr.'s career"
Yep. Worked so well that his brother Jeb isn't running due to having one of the most toxic last names in US politics.
I'd hate to see something that worked poorly.
Re:In My Opinion, One Horrible Analogy (Score:4, Interesting)
> I'd hate to see something that worked poorly.
Wait a year.
Re: (Score:1)
It does seem a pretty daft agenda, doesn't it?
Either they don't succeed in what they attempt, or worse yet they do and are miserable because of it.
Pity that it takes a sane public in order to enforce sanity in politics.
Re: (Score:2)
That depends on your definition of "worse".
If you agree with Darwin's definition, "good" == "fitness" == "the option to kill everyone else, either fast (usually violently), or slow (usually outbreeding them)". If you agree with that view, then it's absolutely not worse. In fact it's an absolute necessity to have this option.
If you agree with the philosopher's definition "good" == "whatever feels good", then it's really bad. Sadly, the philosophers' states, like in ancient Greece for example ... did not surv
Re: (Score:1)
That depends on your definition of "worse".
In terms of functionality, individual or collective satisfaction with the results, and general sanity.
with Darwin's definition, "good" == "fitness" == "the option to kill everyone else, either fast (usually violently), or slow (usually outbreeding them)".
Those are not quite the fitness criteria I seek in a political representative. Though they're usually what I get.
The problem with our current "there is only one ideology ... " approach is that it prevents people from even seeing the structure of alternative approaches, and what makes them tick.
I disagree. The problem, I think you'll find, is that the education level in society has been diminished. What society used to collectively know and have certainty about, it now lacks solid facts on which to base its conclusion. Everything becomes a matter of conflicting opinion as a result.
Re:In My Opinion, One Horrible Analogy (Score:5, Insightful)
The other problem is that in "cyber war" there are no laws of physics to ensure that the rules of kinetic destruction apply. Certain targets can be practically indestructible. Basically MAD only works if both parties are horribly incompetent at computer security and plan to keep it that way.
Re:In My Opinion, One Horrible Analogy (Score:5, Insightful)
Not only that, but with a nuclear bomb, you can see it coming. You can see where it came from. You know who sent it. And you can fire back appropriately. Chinese hackers can attend American colleges, and attack from our own soil, and we have no way of knowing where or who it came from, if they're really good at it, that is.
Re: (Score:3)
Something people really should start learning about espionage and computer security. If the enemy is really good, you'll never even realize there is an enemy. You'll just be outwitted miraculously at every turn in a conventional setting.
It'll look more like a Kasparov versus the neighbor kids chess game than anything else.
Re: (Score:2)
Yeah, that's pretty much it. There is no "cyber war" -- but there is state-backed industrial espionage.
And the problem with the way these people are thinking about it is that MAD is totally wrong. It isn't offense that you need, it's defense. Especially for the US: What "the enemy" is doing is sabotage and misappropriation trade secrets on a massive scale. Even if you can manage to do the same thing to them, your infrastructure and trade secrets are more valuable than theirs. Which means that having the sam
Re: (Score:1)
Re: (Score:2)
Can you? All it takes is a few SRBMs disguised as shipping containers to pull up to a coast line near a major port and hit a few cities nearby to fucking devastate a country. They can simply be sank afterwords. If you saw them, assuming you were even looking for them in the first place and had automatic detection capabilities, you'd have a few minutes of warning, max. You might be able to figure out where the ship launched from, but good luck figuring out which nationality was responsible for nuking you
Re: (Score:2)
Radiation signatures and other weapon characteristics such as estimated yield can often be traced to the point of origin. It might take some time though. The countries currently seeking atomic weapons would be committing suicide if they used them. Even if they succeeded in detonating one device in a large US city the retaliatory strike ability would not be impaired. One submarine armed with nuclear missile carrying has enough fire power to level the majority of the middle east. One reason the US and Russia
Re: (Score:2)
It can be MAD in that at some point the rate of hostile traffic becomes so large you can't IDS it anymore and you don't know what to pass and what not to; at that point the victim cuts their losses and severs the line.
Trouble is if your China doing all that manufacturing and sales to us business and we decide we have no choice but black hole all your netblocks; well suddenly your economy grinds to slow crawl as does ours.
So it is MAD but its not exactly Cyber warfare specific any way. Its simply the fact t
Re: (Score:2)
Re:In My Opinion, One Horrible Analogy (Score:5, Funny)
I envision ping -t attacks and Minecraft griefing. Possibly a World of Warcraft arena team to take out pesky Chinese farmers. Maybe the US government is going to get into EveOnline and is going to all out attack the Chinese players.
Really.. wtf is "mutual destruction" in relation to a "Cyber-war"?
Re: (Score:2)
Re: (Score:3, Insightful)
Anonymous isn't cyber war. It's hacktivism.
The distinction is drawn by the damage level. If the destruction is comparable with attack vectors classically associated with traditional warfare then that's when it crosses the line. For the most part, this doesn't seem to have happened yet.
Re:In My Opinion, One Horrible Analogy (Score:5, Insightful)
Cyber-warfare is happening now...
You seem to be confusing cyber-espionage (which is happening) with cyber-war (which would involve disrupting most financial transactions, journalism, etc.). You wouldn't get a tweet that cyber-war started because that would be one of the first sites taken down.
The closest we've seen to cyber-warfare is the STUXNET virus; it want far beyond the capabilities of script kiddies running downloadable bots.
Re: (Score:3)
You seem to be confusing cyber-espionage (which is happening) with cyber-war
There can be a pretty fuzzy line between traditional espionage and war as well. For example, in the case of Stuxnet, it was accompanied by assassinations, all to take down what would be a valid military target in a war.
Re: (Score:2)
With no intent to excuse or defend the Chinese government, but isn't that pretty much the quid pro quo the US and the USSR/China has had for ages? I mean, if the situation was reversed, how qui
So only the US and China get Cyber-Destructed? (Score:5, Interesting)
Something makes me think that they will take the rest of us with them . . .
Re: (Score:2)
Exactly. And who's to say that they won't have a mutual interest in destroying the Internet at one point?
Re: (Score:2)
Enh... How does one go about "destroying the internet"?
Re:So only the US and China get Cyber-Destructed? (Score:4, Funny)
You find the giant Linksys router in the secret government facility and pull the plug on it.
Re: (Score:3)
That's funny. It reminds me of a company I worked for, where the network architect thought it'd be a good idea to plug all the company's internet connections into a single Wellfleet. As I recall, after about the fourth time it went south and took the entire company offline, he was invited to resign.
Re: (Score:3)
The internet has already been destroyed as far as I am concerned. There was a brief moment in the early 1990's where the sky was the limit and useful content was relatively easy to find. Now it has devolved into an endless and mindless recycling of garbage, all 100% optimized to make it at or near the top of the search engine pages. Some of this recycling is even done by bots. A lot of it is done by humans plagiarizing the same crap over and over. Occasionally, after about an hour's work, useful content can
Re: (Score:2)
Re: (Score:1)
You can't technically annihilate the Internet altogether, however you can render it completely useless for almost everyone, if you put enough "preventive measures" in place. The current atmosphere allows that, and they seem to have enough scaremongering tactics in reserve to accomplish this. After everything's in place, a "cyber-war" could give them enough pretext to effectively destroy the Internet as we know it. Depending on the regimes of the time, there is a potential that all sides of the war might ben
Re: (Score:1)
Three steps: Kill DNS, then start in with backhoes and anchors there aren't THAT many backbones. Then change the access codes on the sats - boom! no internet.
Even easier: talk the ISPs into closing their backbones to public traffic. The internet isn't NEARLY as decentralized as it should be.
The only way to combat this is with a wide area wireless mesh. every wireless peers it's neighbor. Intercontinental traffic is still gone if the oceanic fiber is cut, but relatively localized networks will still be possi
Re: (Score:2)
One possible problem I see is that with VOIP so common these days (I read recently that AT&T is converting over to VOIP en-masse and closing down a lot of their GO facilities) you can't take out internet without also taking out phone service. I guess my question should be "how does one go about destroying *just* the internet?"
Re:So only the US and China get Cyber-Destructed? (Score:4, Interesting)
I might start with a few ships dragging anchors through the fiber to China. Follow it up with a few ships threatening the same to India if they route Chinese traffic over land. Of course, that would be treated like an act of war (it is), however, I don't see the Chinese as the protagonists on this, we don't attack their shit aggressively and constantly but their great firewall has the capability to stop outgoing attacks and they seem to not bother or even encourage it.
It would be relatively easy to drastically reduce or completely cut of China by physically destroying the network. They'd have to use operatives or proxies that were pre-located elsewhere on the planet, which takes their "there's billions of them!" advantage down most of the way.
Hell, half of Africa was shut off accidentally a couple days ago.
Anybody with any brains already has most of the Chinese netblocks killed at their firewall anyway. For my stuff, the Chinese are a zero signal to noise ratio. Know what else NOBODY NOTICED.
There's already a war going on, the Chinese host a lot of compromised machines and initiate a lot of attacks already.
I don't agree (Score:5, Insightful)
Part of the problem with outsourcing all of our IT manufacturing is that we don't know what foreign agencies can kill with a single switch. It's only a part mind you, but enough that we in the US should be severely concerned with. No matter how good our hacking staff is, if the hardware they are hacking on is killed from a remote location.. well.. that pretty much ends the game.
Re: (Score:2)
How do you envision this magical remote kill switch working?
Re:I don't agree (Score:5, Interesting)
You could use it as an ECM system - respond to hacking attempts with a packet containing the kill-code - but if you do that consistantly they'll eventually realise something is going on and start replaying packet dumps until they find the cause.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Good plan but network cards are produced in America and Taiwan, not in China. They are then shipped to Foxconn's factories where they are assembled by low paid workers who have neither the equipment nor the skill to change the circuitry of an already finished chip.
Let's get this straight:
CPUs are made by Intel and AMD in America.
Motherboards and NCs are mostly made in Taiwan.
Harddrives are made in America (Western Digital) and South Korea (Samsung).
Your laptop is made in China but nothing inside it is.
Re: (Score:3)
As someone else showed, it does not take a lot in terms of logic. A network interface has to open packets, and a logic circuit to look for a specific string in a packet and die if it finds it, or worse simply repeats that packet on a broadcast to all known addresses can shut people down for a long time. A smidge more code, and we have the packet locked in a buffer so even after a power off/on the card no longer works.
Could China or Korea add such a chip to a NIC that is sold only overseas? Most likely, o
Re: (Score:1)
NSA Trusted Foundry and DARPA Trust (among others) address this issue.
Up the stakes (Score:2)
Are we heading toward a cyberwar with real casualties, like this [wikipedia.org]?
Re: (Score:2)
I would post a link to any Iranian cancer patients needing radiation therapy who are not well enough to travel and have died since the Stuxnet attacks.
Whether or not Iran wants to build a nuke, if any such people have died they are collateral damage.
Re: (Score:3)
Re: (Score:2)
Are you suggesting that Iran couldn't keep its medical isotope producing reactors operating because of a lack of enriched uranium due to the Stuxnet worm? That's something I've never heard before.
Re: (Score:2)
They claim they're producing medical isotopes there and that they have no other source for medical isotopes. Not sure how true it is.
Re: (Score:2)
It sounds quite untrue. If they even have a reactor making medical isotopes (I don't think they do), it's not like it needs to be refueled every year.
You don't use power reactors to make medical isotopes, AFAIK.
Radiotherapy is not done directly at nuclear reactor (except for boron neutron capture which is rare) and medical isotopes can be shipped overseas - most of them are outside of North America I think.
If they are making isotopes with a cyclotron, uranium is irrelevant.
Bogus.
Re: (Score:2)
This one was (fortunately) in an unpopulated area of Russia or it'd have been bad casualty wise. As it stands it's believed to be the largest non-nuclear explosion. Caused by cyber-war/cyber-espionage:
http://en.wikipedia.org/wiki/Siberian_pipeline_sabotage [wikipedia.org]
Cold War 2.0 (Score:1)
Re: (Score:2)
It's funny that they always focus on offense when offensive capability is fleeting, costly and potentially dangerous to yourself*, and defense is vastly more powerful.
*found Apache exploit, keep secret as a "weapon" and hope the enemy (who can turn it back on you minutes after it's first used) isn't as smart, or release it to bolster both your and the enemy's defenses?
Re: (Score:2)
FTFY.
The only truly secure computer is one without a power cord.
(or battery if you want to be pedantic enough to bring up laptops)
While that's going on (Score:1)
While we're busy cyber-assaulting each other in our cyber-war, will the US continue evacuating its industrial base to China?
Cyberwar? *yawn* (Score:4, Interesting)
At least this way we're not sending young men to die needlessly.
Re: (Score:1)
Whatever makes the warmongers in congress happy. At least this way we're not sending young men to die needlessly. What do I know, I'm just an idiot, right?
Do you vote?
Re: (Score:3)
Its not really a MAD strategy (Score:1)
Unless it includes a actual nuclear attack option at some escalated point, its not really MAD. As painful as it is to lose the internet, and as much as it would harm our economy, etc; it could hardly be construed at total destruction of the nation.
"If you break our internet, we'll break yours" doesn't really carry the same weight as "if you break our internet, we'll nuke you into the oblivion."
Turn off the pipes (Score:5, Informative)
If an attack does come from overseas, just turn off the pipes (power off whatever devices the physical undersea fibers connect to). The problem with this is that they are likely setting up a massive botnet within the target country that cannot be blocked by such a method. And we do see that the government tends to not care to shut down botnets [slashdot.org], even now.
So what does MAD mean in this context? (Score:5, Informative)
Trivially, an attack can be stopped or at least contained by simply pulling the network plug. I can't envision a scenario where we'd "lose the internet". We might lose connectivity to some areas for awhile, but it's not like there's some timed self-destruct code buried in Cisco firmware that could be activated en-masse.
Re: (Score:2)
The problem is, like terrorism, cyber conflict is not easily bound to a nation, and the soldiers do not wear uniforms. Even if you got past the legal and moral ramifications, whom do you bomb?
Re: (Score:2)
Re: (Score:2)
The routers won't self-destruct, but there are a lot of things hooked up to computers that can. It's very common to have industrial machinery that can be destroyed or destroy nearby things due to a software fault. Iran's centrifuges are a good example. Hydro dams, nuke plants, chemical refineries... There are lots of nebulous and hard to quantify opportunities, which is why politicians are thrilled to see this become popular.
Re: (Score:2)
I can easily imagine 'losing the Internet' if the shit hits the fan (and by the way, I work on Internet, telco and financial sector IP infrastructure constantly so I'm not completely ignorant of what I'm talking about).
Consider how much networking (and everything else) equipment is made in China, for example.
Is anyone looking for kill code in this hardware? No idea but I think that anyone who buys from a country that is as continually abrasive and invasive as China should assume that they're getting what t
Re: (Score:2)
Re: (Score:2)
Ok, you just ruined my day. Thanks.
Cold War: past and present (Score:3)
Scenario A)
Total annihilation of all mankind, including most living organisms, with the world taking many centuries to slowly recover
Scenario B)
Facebooks r down
Re: (Score:2)
Scenario C)
Financial markets crash
Bank and other financial account information is scrambled
The systems in most fortune 500 firms crash
Communications satellites suddenly don't work anymore
Landline and mobile phone systems stop working
Scenario D)
All the above plus any military systems that haven't been well enough protected
Keep in mind as well, that a cyber attack can be a precursor to a physical attack (ie taking down air defense and then sending in your very real jets / missiles)
They are the reason you are losing the "cyberwar" (Score:4, Informative)
Idiots like these are the main reason Americans are so vulnerable to online threats.
I have written [slashdot.org] about why cyberwar is a false analogy, so mostly I will just repeat myself:
Doesn't this only work when... (Score:3)
Re: (Score:2)
This is false, we control the links (Score:2)
All we have to do is screen out the Chinese Internet connections by Satellite and Cable and it will be like nothing happened.
You don't think all those "disused" satellites in orbit are dead, do you?
China will kick ass and chew bubblegum (Score:3)
"Chinese hackers: No site is safe - CNN" [cnn.com]
"Chinese hacking worries Pentagon" [latimes.com]
"Pentagon hacked, Chinese Army suspected" [arstechnica.com]
"China denies hacking Pentagon computers" [usatoday.com]
Would you really use it for destruction? (Score:2)
Obviously, you could take out parts of an enemies infrastructure using digital means, and that makes sense to create chaos during or before an attack and such. However, an exploit could just be usable one time in a very visible attack. Surely large countries may have a bunch of secret exploits against critical systems. However, after the attack the other side may recover, patch it, and potentially find the previous uses of it and what you did with it.
However, where digital attacks are really outstanding is
News at 11 (Score:1)
This just in... fighting with each other is sub-optimal compared to cooperating with each other.
Now you don't even have to read TFA.
Made in....? (Score:3)
Chinese networking and systems hardware isn't "Made In America".
LOLwut? (Score:1)
Just unplug the goddamn thing! Jesus Christ!
Re: (Score:2)
Re: (Score:1)
Obviously, you've never seen Wargames ;)
Dear Department of Defence (Score:2)