N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say – NYTimes.com
Evidence gathered by software hidden by the N.S.A. to monitor North Korean activities proved critical in persuading President Obama to accuse the government of ordering the cyberattack on Sony, officials said.
I think it's clear at this point that Cyber Warfare is the new arms race. The NYT is reporting that the reason the US was so confident that North Korea was to blame for the Sony hacks is that the NSA had been hacking and implanting malware on North Korean hackers since 2010.
Clearly we need to take all of this very seriously, but this raises some questions for me. Should we be putting our resources into offensive strategies or defensive? If we're on the offense (breaking into other nation states) can we really lay blame when they get caught doing the same? If we get caught and they retaliate does this mean that we escalate into WWIII, just all IP based?
Travis Owens says
Integrity and foreign policy… US fails at both
Evan Dierlam says
If cyber warfare is the new arms race, I fear the day someone invents the atomic bomb.
Thomas Wrobel says
I dought North Korean hackers are even remotely a threat to the US. Their whole country runs of a intranet – their simply isn't the breading ground for people to develop that sort of skillset.
Other countries? sure.
And no, no pro-active moves against a country is ever justified. Not spying. No military. Nothing. Defensive only is moral.
Also worth noting the NSA spying shit is likely largely economic anyway. Its all about moneys.
Thomas Wrobel says
+Evan Dierlam A atomic bomb for whiping out electrics and hard drives would be a atomic bomb 😛
Paul Spoerry says
Or a giant EMP.
Thomas Wrobel says
+Paul Spoerry Out of interest, fiction aside, has there been a EMP weapon made without other effects? ie. a nuke effect without the explosion or radiation.
Rust Cohle says
I would imagine this sort of warfare will become more hazardous when the internet if things is fully developed.
STEVEN REID says
you are not suppose to get caught. that is how spying works.
Trilithon Stone says
not to forget this is still asymmetrical combat… the west, and the U.S. in particular, has far more infrastructure targets at risk … and as unappealing as it is to consider, Nigerian 419 scams are not the worst thing out there… so, not being naive,… there is no doubt that the conflict in this shadow world is every bit as hot as the cold war ever was…
Flo H says
Everyone spies on everyone. Depends on what u do with info
Paul Spoerry says
+Thomas Wrobel I think so… according to Wikipedia they exist, though they all require a chemical explosion to kick it off.
http://en.wikipedia.org/wiki/Electromagnetic_pulse#Non-nuclear_electromagnetic_pulse_.28NNEMP.29
Thomas Wrobel says
interesting
King Johnny says
That's not the story you demonic
liars, willing to cheat GOD a fair
say here regardless.. No evidence
is given by the magic TVs, of this
false accusing Satanic enemy
of good will to do right.. Not
war Democracies for the worst
of military dictatorships, that
deny the right of one to be
freely educated on Justice
securing victory for everyone.
The Golden Rule is what we
call it, of the Christian Jew
Muslim crews… Vote Johnny.
Daniel W says
POLICY. It is DoD policy that:
a. Military platforms, systems, subsystems, and equipment will be mutually compatible in
their electromagnetic operational environment (EMOE).
(1) Military systems will meet their operational performance requirements without
experiencing unacceptable performance degradation from E3 or causing unacceptable
performance degradation to other systems.
(2) Joint-Service E3 control will be attained by implementing common DoD-wide
philosophies, approaches, and tactics, techniques, and procedures (TTPs) in the development,
design, production, testing, and operation of military platforms, systems, subsystems, and
equipment to address unacceptable degradation from E3.
(3) Rather than relying on after-the-fact remedial measures, built-in safety by design and
electromagnetic interference (EMI) mitigation techniques will be addressed in the acquisition
process.
b. Requirements to control E3, including those used to mitigate the impact of high-power
microwave and electromagnetic pulse (EMP), will be implemented throughout the acquisition
life cycle of military platforms, systems, subsystems, and equipment.
(1) Requirements to control E3 will be developed during the risk reduction phase of the
acquisition life cycle of military platforms, systems, subsystems, and equipment, and fully
defined and evaluated before production and deployment.
(2) Joint Capabilities Integration and Development System (JCIDS) and acquisition
system documents will be used to specify, define, and verify requirements to control E3. These
documents include the initial capabilities document (ICD), capability development document
(CDD), capability production document (CPD), equipment specification, information support
plan (ISP), acquisition strategy (AS), system engineering plans, and test and evaluation master
plan (TEMP).
c. E3 control and mitigation techniques will be validated and verified for military platforms,
systems, subsystems, and equipment using the implementation and tailoring of applicable
military or industry standards, procedures, and handbooks of test requirements. Vulnerabilities
and limitations will be documented and reported during critical design and milestone reviews.
d. Hazards of electromagnetic radiation to ordnance (HERO), personnel (HERP), and fuel
(HERF) will be mitigated before the administration of military exercises, operations, and
activities.
e. Military E3 standards, specifications, and handbooks stressing interface and verification
requirements will follow the guidance in DoD 4120.24-M (Reference (d)).