PDA

View Full Version : This article should scare you sh*#$>




green73
06-14-2013, 10:28 AM
The Secret War

INFILTRATION. SABOTAGE. MAYHEM. FOR YEARS FOUR-STAR GENERAL KEITH ALEXANDER HAS BEEN BUILDING A SECRET ARMY CAPABLE OF LAUNCHING DEVASTATING CYBERATTACKS. NOW IT’S READY TO UNLEASH HELL.

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”

In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.

But there is a flip side to this equation that is rarely mentioned: The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander—who declined to be interviewed for this article—has concluded that such cyberweapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.

And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

The success of this sabotage came to light only in June 2010, when the malware spread to outside computers. It was spotted by independent security researchers, who identified telltale signs that the worm was the work of thousands of hours of professional development. Despite headlines around the globe, officials in Washington have never openly acknowledged that the US was behind the attack. It wasn’t until 2012 that anonymous sources within the Obama administration took credit for it in interviews with The New York Times.

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyberdefense contractors. And more attacks may be planned.

cont (worth reading to the very goddamn end)
http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/

CPUd
06-14-2013, 10:37 AM
He is right about the private sector not being able to handle it. Not because they aren't aware of the threat, but because they are not making it a priority. If you want to see what's out there right now- shops wide open:

http://www.shodanhq.com/

CaptUSA
06-14-2013, 10:39 AM
This article should scare you sh*tless
Why yes... Yes it does!

It's just a matter of time I guess until someone decides to pull a trigger. Every time a government gets a new toy that they haven't had before, they feel the itch to use it. Rock and spears to arrows to swords to heavy horse to the phalanx to cannons to guns to bombs to nukes to cyberwarfare. And the beat goes on...

jkr
06-14-2013, 10:44 AM
THIS guy fights for the USERS

http://www.lyricis.fr/wp-content/uploads/2010/10/Tron-1982.jpg

green73
06-14-2013, 10:51 AM
They can zero in on any device connected to the internet and they are armed with “zero-day exploits”--secret knowledge of the device's vulnerabilities.

Also, rotten Microsoft gives them a list of vulnerabilities in Windows in advance of their security updates.

pcosmar
06-14-2013, 10:59 AM
Well is has been clear to me that EFF, defectivebydesign.org, and Anonymous are not the biggest threat to the internet.

I also quit using windoze for anything but games long ago.

green73
06-14-2013, 11:04 AM
It's not just Microsoft.

US Spy Agencies Said to Swap Data With Thousands of Firms
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

pcosmar
06-14-2013, 11:19 AM
It's not just Microsoft.

US Spy Agencies Said to Swap Data With Thousands of Firms
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html

I know,, Apple sold out a while back.

Linux still has a lot of varied options,, and is personally configurable. And is rather difficult to compromise remotely.

Carson
06-14-2013, 03:53 PM
I wasn't even half way through the article and noticing how my pants were fitting better and THEN I got to the Stuxnet part!

green73
06-14-2013, 07:13 PM
Fuck you, asshole mod who edited the title.

sh*#$> does not mean sh*tless, ya dumb fuck control freak.