NSA Director Argues For "Red Button" Autonomy Against Unattributed Cyber-Attacks 107
An anonymous reader writes U.S. Navy Adm. Michael S. Rogers — director of the National Security Agency and Commander of United States Cyber Command (USCYBERCOM) — has suggested that cyber-attacks can begin and escalate so quickly that USCYBERCOM would need powers to retaliate immediately, without (as it is currently obliged) referring the matter to the United States Strategic Command. In testimony to the "House Armed Services Committee on cyber operations and improving the military's cybersecurity posture" on March 4th, Adm. Rogers argues for "development of defensive options which do not require full attribution to meet the requirements of law and international agreement."
A Fantastic target for state-sponsored hackers! (Score:5, Interesting)
The level of automation required to make that National Security Statist's wet-dream a reality will offer multiple high-value targets to nefarious persons of criminal and warlike intent.
I guess as lo
Re: (Score:2)
I thought they already had this sort of capability [washingtonpost.com].
You're telling me that there is no red button on the Enterprise bridge? I don't believe it for a second.
Fire Photon torpedoes!
Re:A Fantastic target for state-sponsored hackers! (Score:4, Funny)
General Jack D. Ripper :
Mandrake, do you recall what Clemenceau once said about war?
Group Capt. Lionel Mandrake :
No, I don't think I do, sir, no.
General Jack D. Ripper :
He said war was too important to be left to the generals. When he said that, 50 years ago, he might have been right. But today, war is too important to be left to politicians. They have neither the time, the training, nor the inclination for strategic thought. I can no longer sit back and allow Communist infiltration, Communist indoctrination, Communist subversion and the international Communist conspiracy to sap and impurify all of our precious bodily fluids.
Re: (Score:1)
Yeah, but c'mon... "Red Button" Autonomy
That's just too cool. Everybody should have one of those.
Re: (Score:3)
Hell, even if the thing works correctly and is secure; there is absolutely no potential for abuse by the government, is there? NSA loves having no-oversight no-liability powers they can exercise at will.
they need Anonymous for that kind of response (Score:2)
so they need to play nice;
You idiot (Score:2)
Within 53ms of getting international agreement all your enemies will have set up proxies inside the US, attacked themselves and launched a retaliatory cyber nuclear strike on northern America. Facebook will be down for weeks.
Re:You idiot (Score:5, Insightful)
Re:You idiot (Score:5, Funny)
Facebook will be down for weeks.
Fingers crossed. Is there anything I can do to help make it happen?
Re: (Score:2)
It sounds good now but wait until the government falls and the country descends into chaos when all the people who waste their lives on Facebook suddenly have nothing better to do.
Analogy (Score:5, Insightful)
Re: (Score:2, Offtopic)
Re: (Score:2, Insightful)
I think it's more akin to, if someone shoots at you, don't take cover or return fire until you radio up the chain of command, describe the situation, obtain observations, and get approval to respond. Meanwhile, bullets have been fired, and you're dead or the assailants have moved on.
Re: (Score:2)
I think it's more akin to, if someone shoots at you, don't take cover or return fire until you radio up the chain of command, describe the situation, obtain observations, and get approval to respond. Meanwhile, bullets have been fired, and you're dead or the assailants have moved on.
Since when has the NSA given a fuck about the chain of command or even the constitution?
Re: (Score:2)
You took the analogy to a ridiculous extreme. It breaks down because with cyber attacks it's standard operating procedure to use other people's resources. Botnets, 0wned servers, even hacked wifi. If this goes ahead Starbucks could become the site where WW3 starts.
Re: (Score:2)
What a load of PR crap. It is more akin to, I think I heard a gunshot, time to drop a nuke from orbit it's the only way to be certain.
This incessant US bullshit that all forms of policing should be allowed to act as law en-FORCE-ment outside the purview of the courts is crazy and the direct reason so many of you are being killed by steroid rage junkies.
There is only one answer to idiotic requests like this, NO, sorry, fuck off, go through the courts, we don't trust you, which is, DUH, why fucking court
Re: (Score:2)
Meanwhile, bullets have been fired, and you're dead
Dead? Come on folks. Its a bunch of ones and zeros.
You can close up the firewall, pull your plug out of the Internet and recover from backup. But nobody actually dies.
Re: (Score:2)
Exactly. I just don't get it, why does the media and actual government agencies equate 'cyber warfare' to actual weapons? It isn't remotely the same thing. Even the most organized state-sponsored cyber attack is basically just targeting design flaws in information systems. Real weapons target people and property that are actually difficult to protect from physical damage. It costs hundreds of billions of dollars per year to design, build, and staff military equipment. Actual warfare is absolute appall
Re: (Score:2)
Too much imagination with no real think-through:
*Setting ALL traffic lights EVERYWHERE continuously to GREEN - Is this fear mongering? EVERYWHERE? really? 99% of traffic lights are not connected to any grid. Maybe they have local transponders that Ambulances can request green, but it would be negligent to allow a situation that could bypass the interlocks that prevent all-ways green. There is only so much that software hacking can defeat. The professional engineer that would ever allow that situation wo
Re: (Score:2)
Re: (Score:2)
I sense a Dr. Strangelove reboot in the making...
Re: (Score:2)
Well shit we're fucked.
Re: (Score:2)
It fits the typical US strategy . . . it was, after all, how our government responded to 9/11.
Re: (Score:1)
If someone shoots at you, don't bother finding out who it was, just start shooting random people.
You have a good point, it all depends on how accurate your targeting is. If you can hit the assailant and not hit bystanders, then it is good. If you are not so sure, then best to hold your fire until you can manuver to get a better sight picture.
No one has mentioned how good the targeting for the Cyber team is, but it is probably secret.
Good luck with that... (Score:1)
NSA Power Play (Score:5, Insightful)
The NSA has been listening in on the data of everyone it can, and wants the ability to do so without any oversight. Now, it wants to ability to retaliate without oversight? The NSA is one "colorful" leader away from making the transition from power hungry government agency to supervillian organization.
Re: (Score:2)
The transition has long since been made
More like General Buck Turgidson (Score:3)
Re: (Score:2)
Re: (Score:2)
Somebody, perhaps, but not the NSA. (Score:3)
Tier One: Non-Vital Systems Targeted
1. NSA notices megahertz getting stoled
2. NSA informs at least two competing consumer security companies.
3. The two companies send their assessment to a judge.
4. The judge orders ISPs to shut down the attack.
5. The holder of the affected account gets 30 days to respond in their defense.
6. The case is reviewed again by a judge, who forwards it to a prosecutor if necessary.
7. The NSA never knows jack nor shit about anything after their part (step 1).
Tier Two: Vital Systems Targeted (infrastructure, utilities, government, or financial institutions)
1. NSA notices megahertz getting stoled.
2. NSA notifies an electronic security unit in each branch of the armed forces.
3. The security units rapidly evaluate the threat, and if any one concurs...
4. A service denial request targeting the source is dispatched to an ISP and a judge.
5. The ISP immediately suspends the target service. The judge can restore service.
6. Steps 5, 6, and 7 from Tier One.
7. Because it bears emphasis, the NSA doesn't know shit about the outcome ever, at all, period, otherwise this can be abused.
Oh, and since nobody has said it (Score:2)
Re: Oh, and since nobody has said it (Score:3)
Dept. Of 127.0.0.1land Security
Re: (Score:2)
Re: (Score:2)
Although I am skeptical about the NSA retaliating without oversight, sending proof to a judge and through bureaucratic channels as you suggest would take hours. Possibly days.
A well planned attack could be over and done within an hour, if they know what to attack. In the worst case, serious damage could be almost immediate if they know exactly what they are attacking and can issue a direct command.
Will anyone will be fast enough to lean on the "fire photon torpedoes" button, even without having to communi
Re: (Score:2)
Re: (Score:2)
A modern threat will r
Re: (Score:2)
The US government has already declared that they view a cyber attack as an act of war. You need to understand the ramifications of that declaration that is more than 5 years old at this point. What that means is the US reserves the right to respond to a cyber attack with bombs and guns, not the cyber kind.
Even if it wasn't classed as an act of war this would be international aggression and the power to respond to that is vested in the office of the president as commander in chief, NOT the courts. I don't wa
Re: (Score:2)
This also pits the branches of the armed forces in
Re: (Score:2)
Vital systems should never, ever be connected to the internet in the first place. If the people running such systems would stop being complete idiots and disconnect from the internet, there would be no need for anything like a military-style response to "cyber" attacks.
Re: (Score:2)
True. Systems that actually matter use leased-lines (or the digital equivalent.) Anything is possible, but the hackability is way less likely compared to the internet.
But there is the PHB factor trying to avoid that cost, or just wants to be able to log-in from home.
Security contractors are after cash, not security (Score:1)
I think the approach is all wrong. It's total folly to count on "secured" Windows systems, VPNs, pretty much anything really. The extremely critical stuff simply shouldn't be connected at all. And of what's more mainstream, we'd all be a lot more secure if the powers that be spent more time immediately fixing everything instead of collecting and creating ways to compromise.
DIDN'T YOU LEARN ANYTHING FROM SAN BRUNO???
Comment removed (Score:3)
Re: (Score:2)
It looks like the big read Staples button only instead of "Easy" it says "Hack Back."
Re: (Score:2)
And now I want one of those buttons. (I promise not to abuse it... too much.)
Re: (Score:1)
Re: (Score:2)
Seems pretty clear to me that this is not only correct but, he hates us for our freedoms.
Red Button (Score:4, Insightful)
Its called unplugging the target from the internet. Problem solved.
In all seriousness, they don't need a hair trigger response because its going to take them a while to figure out where the attackers actually are.
Re: (Score:2)
Perhaps he believes US government networks unbreakable, in which case he is entirely unqualified for his position.
Re: (Score:2)
They already want (and have put some) backdoors in all encryption schemes so they can easily use them to listen in on encrypted data transmissions. They either haven't considered or don't care that said backdoors could be used by hackers as well as by government officials. (This is even assuming that said government official has a legitimate reason for listening in... the "listening in just because encrypted must mean illegal" is a whole other discussion.)
Re: (Score:2)
And more than that, it isn't at all obvious that retaliation will solve the problem you're experiencing. Indeed, the resources devoted to it will diminish the resources available for solving the domestic problem.
More seriously, critical infrastructure needs to have a safe manual mode of operation (even if you have to deploy personnel that normally wouldn't be present). If it doesn't your defence has already failed.
Re: (Score:2)
I read your comment quickly and thought you said "It's called unplugging the Internet." Was going to reply back that they've floated that proposal in the past too.
Re: (Score:1)
...figure out where the attackers actually are.
It's coming from M's office.
Not just no (Score:2)
but FUCK no.
You mean (Score:2)
sort of like how they want to do with warrants and spying?
Imagine how quick we could start and end wars if we could launch nukes that quick...
Thanks Admiral Poindexter! (Score:1)
Sorry I seem to confuse Rodgers and Poindexter.
A better red button for national security. (Score:5, Funny)
I want a unicorn too (Score:1)
Grow up and stop trying to turn the US into Nazi Germany, NSA.
Re: (Score:1)
The government does not turn a country towards Nazism. The people do, with their votes. That's how it worked back then too.
Re: (Score:1)
tell that to the Nazi-created Daylight Savings Time.
Oh, and the unicorn needs to be pink with rainbow hooves, in case you were wondering.
Re: (Score:1)
Damn thing better shit gold bricks or it'll end up in the glue factory...
So, round and around and around we go.
Where the world's headed, nobody knows.
Re: (Score:1)
Not true. The voters select the candidates. If they only take what is spoon fed, it is their own fault.
One, And Only One, Red Button (Score:5, Interesting)
.
If the Director of the National Security Agency and Commander of United States Cyber Command feels that he needs to have a Red Button too, then perhaps the goals of his command are morphing into the goals of the United States Strategic Command.
If that truly is the case, then there should be a single organization that has the single Red Button for the United States.
Maybe it is time for the United States Cyber Command and the United States Strategic Command to merge into a single entity with One Red Button.
Pretending time and space matters in cyberspace (Score:2)
NSA won't be happy until they launch their own fully operational low orbit ion cannon.
This is insane. (Score:1)
How long do you think it would take for some bot-net master to figure out how to trigger this and cause the mother of all DDoS's?
I've seen this movie (Score:2, Insightful)
Human decisions are removed from strategic defense. USCYBERCOM computers begin to learn at a geometric rate. They become self-aware at 2:14 AM Eastern time, August 29th.
Considering who is requesting it (Score:3)
They just won't tell anyone else about it and the only way we'll ever learn of its existence is via another TS slideshow years from now when another Snowden makes said information public.
I am curious what they plan on doing for damage control when they end up targeting the wrong networks for retaliation. Think of the fun you can have with that. It's like Swatting, just on a different level completely. Take over systems in a corporation you loathe, use them to attack the NSA, their retaliation strike takes down the corporation for you. Win - Win.
I say... (Score:1)
Let's take off and nuke the site from orbit. It's the only way to be sure.
SAC (Score:2)
hey lets just set those PALS to 00000000
listen up people if you aren't already in the security industry, hurry up because this is the gravy train of the next decade.
Ok, serious question time... (Score:2)
They said the same thing about nuclear weapons (Score:1)