GPS News  
Orchestrating A Catastrophic Denial Of Service

the next total war could take place in cyberspace within racks of computers across the world
by Loren B. Thompson
Arlington, Va. (UPI) Dec 29, 2008
Today, digital networks are so ubiquitous that their sudden disappearance would lead to economic collapse, and yet many people are barely aware they are relying on networks when they turn on the lights, go to the grocery store or seek medical care.

But the same features that make digital networks pervasive in everyday life also make them ready conduits for viruses, worms and other forms of malicious software that can destroy the wealth and welfare of unsuspecting users.

More ominously, clever attackers potentially can manipulate the system so it ceases to function entirely, leading to widespread deprivation, disorder and even defeat at the hands of a foreign power.

Recent trends in the evolution of cyber threats have led many experts to believe the danger is growing worse.

First, malicious software is proliferating at such an alarming rate that new applications may outnumber legitimate software releases.

Second, as these malicious programs are shared on the Internet, predators are becoming more subtle and sophisticated in their efforts.

Third, attacks increasingly seem to be originating from well-resourced operators such as governments rather than disaffected freelancers. And fourth, the tools for combating threats -- for detecting and blocking and tracing attacks -- are not keeping up with the danger.

In recent years the U.S. armed forces and intelligence agencies have faced rapidly escalating attacks on their information networks from countries such as Russia and China, and from a vast array of less capable perpetrators.

This facet of the cyber threat is largely invisible to the general public, because the government is not eager to advertise its vulnerabilities or how much it knows about who is mounting the attacks.

One measure of the danger, though, is the Bush administration's decision to launch a Comprehensive National Cybersecurity Initiative to protect government networks during its final year in office. The initiative was reported to be the biggest new item in the fiscal 2009 intelligence budget.

Military planners and intelligence analysts have long known that adversaries would seek to compromise U.S. networks in wartime. The idea of targeting key nodes in enemy networks has a long history that predates the Information Age, as reflected in the plan of the U.S. Army Air Forces to target electrical grids, refineries and communication nodes in World War II.

But the advent of digital networks has added a new twist to this strategy. In the past, the U.S. military was concerned mainly with "kinetic" attacks on its networks using high-explosive munitions, or gross "non-kinetic" effects such as the electromagnetic pulse generated by nuclear blasts. Today, it must also worry about more elusive dangers such as malicious software that undermines the reliability and security of vital systems.

(Next: Paralyzing the U.S. armed forces by cell phone and lap top)

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


The Virtual Fog Of Internet Warfare
Arlington, Va. (UPI) Dec 24, 2008
Digital networks are the nervous system of our modern technological civilization, essential to commerce and culture. The entire global economy, from banking to utilities to manufacturing to healthcare, relies on Internet-style communications. Even the U.S. military has reorganized for what it calls "network-centric warfare."







  • China Eastern says bailout increased to one billion dollars
  • Britain's environment minister concerned by Heathrow plan
  • Climate protesters cause chaos at British airport
  • Thompson Files: Protect U.S. aerospace

  • China's Foton says clean energy car factory opened in Beijing
  • Thompson Files: Wisdom on the bailout
  • China plans to avert US-style auto crisis: report
  • China opens road tunnel under Yangtze: state media

  • Boeing Develops Common Software To Reduce Risk For TSAT
  • USAF Tests Battlespace Information Solution On AC-130 Gunship
  • Harris Awarded Contract For USAF Satellite Control Network Program
  • LockMart Delivers Key Hardware For US Navy's Mobile User Objective System

  • What Motivates Iran And Russia On The S-300 Deal Part Two
  • Moscow Says Offer To On Joint Radar Use Still Stands
  • BMD Focus: Russia's S-300s boost Iran
  • LM Reports SBIRS Progress But Much Remains

  • Two more stand trial in China milk scandal
  • Chinese dairy firms to pay out millions to milk victims: state media
  • Taiwan home-grown food firms get boost after China scandal
  • Chinese dairy firms agree to pay compensation for melamine victims: report

  • Natural disasters killed over 220,000 in 2008: reinsurer
  • Avalanches kill at least six in Canada
  • Dogs of War: The humanitarianism market
  • China adds 32 deaths to dismal work safety statistics

  • ThalesRaytheonSystems To Upgrade US Army Firefinder Radar
  • Lockheed Martin SBIRS Team Delivers Major Subsystems For Second GEO Satellite
  • New polymer coatings prevent corrosion
  • Solutions Created For Two NASA Missions

  • Marshall Sponsors Four Student Teams In FIRST Robotics Competitions
  • Jump Like A Grasshopper
  • Rescue Robot Exercise Brings Together Robots, Developers, First Responders
  • Honda unveils leg assist machine for elderly

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement