It's insane how much infrastructure is still tied to relatively unsecured SCADA systems.Open a dam and flood a region, crash a plane, cause a POL facility to explode, etc.
From the article:Lethal Cyber effects?
Fact.It's insane how much infrastructure is still tied to relatively unsecured SCADA systems.
Open a dam and flood a region, crash a plane, cause a POL facility to explode, etc.
Killing civilians as collateral is one thing, killing them as part of the plan is another.In a zero CDE, zero CIVCAS environment...dream the fuck on.
17-series MFers are Snake Eaters.
WW II was the last time either side shrugged it's shoulders over civilian deaths.
Not recognised states.Tell that to ISIL, or the Muslim Brotherhood...
We see zero day attacks on pretty regular basis. Stuxnet exploited multiple zero day vulnerabilities. Sony's attack utilized a zero day vulnerability. Java has served as an attack vector multiple times. Zero-days are even sold on the black market. The question is when we get hit with one that is truly crippling to critical infrastructure or something similar.We had some boffin here recently for a bit of jaw jaw. They were talking plausibly of a zero day attack from someone. How far off it was wasn't outlined
Agree. The ethical/moral component present a roadblock for us but not necessarily for our adversaries. Are we likely to cause a nuclear reactor meltdown? No but an organization such as ISIS or another more technically advanced group/country may not hold the same restraint when it comes to us.In a zero CDE, zero CIVCAS environment...dream the fuck on.
Actually you could win buy sending infected computers everywhere.Languages are the new WMD. Let's invade every nation with a computer. Dick Cheney approves.
Actually you could win buy sending infected computers everywhere.
Great idea.
Agree. The ethical/moral component present a roadblock for us but not necessarily for our adversaries. Are we likely to cause a nuclear reactor meltdown? No but an organization such as ISIS or another more technically advanced group/country may not hold the same restraint when it comes to us.
This presents the real challenge. It's true asymmetric warfare and the technology threshold required to become a legitimate threat is significant lower than it is for something such as NBC development. Now, rather than looking at nation states and larger better organized terror groups, we must consider and address threats from significantly smaller but technically capable organizations, such as organized crime groups in former Soviet states.