Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption The Military Government Security IT

Separating Cyber-Warfare Fact From Fantasy 111

smellsofbikes writes "This week's New Yorker magazine has an investigative essay by Seymour Hersh about the US and its part in cyber-warfare that makes for interesting reading. Hersh talks about the financial incentives behind many of the people currently pushing for increased US spending on supposed solutions to network vulnerabilities and the fine and largely ignored distinction between espionage and warfare. Two quotes in particular stood out: one interviewee said, 'Current Chinese officials have told me that [they're] not going to attack Wall street, because [they] basically own it,' and Whitfield Diffie, on encryption, 'I'm not convinced that lack of encryption is the primary problem [of vulnerability to network attack]. The problem with the Internet is that it's meant for communication among non-friends.' The article also has some interesting details on the Chinese disassembly and reverse-engineering of a Lockheed P-3 Orion filled with espionage and eavesdropping hardware that was forced to land in China after a midair collision."
This discussion has been archived. No new comments can be posted.

Separating Cyber-Warfare Fact From Fantasy

Comments Filter:
  • by Pojut ( 1027544 ) on Friday October 29, 2010 @08:34AM (#34061284) Homepage

    It does if you find the right woman :)

    And don't call me Shirley.

  • by sakdoctor ( 1087155 ) on Friday October 29, 2010 @09:29AM (#34061644) Homepage

    Security is best outsourced entirely to a company with a metal effect logo and lots of padlocks on their website.
    The most important aspect of security is the visualisation shown to the end user.
    All workstations should be protected by at least a green spinning cube.
    Voice recognition or hand print scanners are the way forward.
    Light your server room from above very slow spinning fan blades.
    Factor in around one henchman in black, per 100 servers.
    Have web access to all critical systems. input[type="password"]{ font-size:1000%; }
    Have a physical self-destruct (as in a bomb), to destroy all your unencrypted data, if you simply get overwhelmed by Russian hackers in quasi-futuristic clothing.

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...