Feral Jundi

Sunday, December 18, 2011

Legal News: Congress Legalizes Cyber War

In language discussing the bill, conferees say that because there is no historical precedent for what constitutes traditional military activities in cyberspace, “it is necessary to affirm that such operations may be conducted pursuant to the same policy, principles and legal regimes that pertain to kinetic capabilities.”

This is big news, and historical. The rules and laws of kinetic war now apply to Cyber War, and this brings up all sorts of ideas. For example, will we see more Cyber Lance type activities?  Maybe a US special forces team combined with civilian hackers to locate and kill/capture enemy hackers or whomever?  Who knows, and who knows how these new rules will apply?

Perhaps we will see the same issues that have popped up for today’s modern wars. Especially with the hybrid of private and public forces in conflict. I say this, because the US does not have the monopoly on ‘hacking force’. If they want the best, they can try to develop that capability internally, but inevitably they will have to reach out to private companies or individuals that are experts in these fields and pay them to do it.

Here is one quote below that really perked me up. Check it out:

Since the military cannot afford to pay enough to recruit qualified software and Internet engineers for this sort of work, it has turned to commercial firms. There are already some out there, companies that are technically network security operations, but will also carry out offensive missions (often of questionable legality, but that has always been an aspect of the corporate security business.)
Some of these firms have quietly withdrawn from the Internet security business, gone dark, and apparently turned their efforts to the more lucrative task of creating Cyber War weapons for the Pentagon. It may have been one of these firms that created, or helped create, the Stuxnet worm.

I read this and thought, why not just fire up the Letter of Marque and Reprisal and give these firms the legal authority and protections necessary to take part in offensive operations?  The LoM is sitting right there in the War Powers clause in the US Constitution, and it just seems to me that we are missing the boat when it comes to doing this stuff. We could be legally authorizing the companies to steal funds and intellectual property from all sorts of enemies out there, and label these companies cyber privateers. (which if the military helped at all, would those commanders or the US be entitled to a cut? lol)

My other thought about all of this is when will we see a Cyber Weapon used in such a way as to actually kill like a real weapon?  And with this public/private partnership we will have, we could potentially see IT Security companies build these weapons, and possibly even launch it. Just imagine if Stuxnet actually caused deaths in some weapons plant or nuclear facility? That would definitely put the ‘War’ in Cyber War. Very interesting….-Matt 

 

America Legalizes Cyber War
December 18, 2011
The U.S. Congress approved a new law on December 14th that allows the Department of Defense to conduct offensive Cyber War operations in response to Cyber War attacks on the United States. That is, the U.S. military is now authorized to make war via the Internet. The new law stipulates that all the rules that apply to conventional war, also apply to Cyber War. This includes the international law of armed conflict (meant to prevent war crimes and horrid behavior in general) and the U.S. War Powers Resolution (which requires a U.S. president to get permission from Congress within 90 days of entering into a war).
The U.S. Department of Defense has long advocated going on the offensive against criminal gangs and foreign governments that seek (and often succeed) to penetrate U.S. government and military Internet security, and steal information, or sabotage operations. Over the past year, and without much fanfare, the Department of Defense has been making preparations to do just that.

(more…)

Thursday, September 30, 2010

Technology: Cyber Assassination

In Italy, not too long ago, a mob boss was shot but survived the shooting. That night, while he was in the hospital, the assassins hacked into the hospital computer and changed his medication so that he would be given a lethal injection. He was a dead man a few hours later. They then changed the medication order back to its correct form, after it had been incorrectly administered, to cover their tracks so that the nurse would be blamed for the “accident.” 

*****

     This is an interesting thought.  Is cyber assassination possible and if so, is there an example of cyber assassination?  The article below is what grabbed my attention and I wanted to investigate.

     From what I can gather, I found these three sources for the mob boss killing, but I have yet to find a news source. If anyone can confirm or deny that this actually happened, complete with a source, I would be very interested to read it.  I will also make an edit.

     The other thing I wanted to do is present possible scenarios in which cyber assassination could be feasible.  Below I listed several news stories of medical device security and hospitals/industrial plants being hacked. I also think the latest cyber attack against Iran’s nuclear facilities is an example of this type of hacking. So the ability to get into these sensitive and supposedly secure places in the present day is feasible.

     Which leads me to my next point and that is if these things can be hacked into, then could the next step be actually causing death? A terrorist attack designed to kill many people, or an assassination of a specific individual? Food for thought. –Matt

—————————————————————–

Cyber terrorism hits Nigeria

Saturday, September 25, 2010

(a paragraph from the article)

In Italy, not too long ago, a mob boss was shot but survived the shooting. That night, while he was in the hospital, the assassins hacked into the hospital computer and changed his medication so that he would be given a lethal injection. He was a dead man a few hours later. They then changed the medication order back to its correct form, after it had been incorrectly administered, to cover their tracks so that the nurse would be blamed for the “accident.”Story here.

——————————————————————

From Could A Computer Kill You?

According to the sites below, a mob boss was shot but survived. That night while he was in the hospital, the assassins hacked into the hospital computer and changed his medication so that he would be given a lethal injection. He died a few hours later.

Examples of Cyber-terrorismfrom

Examples of Cyber-terrorismfrom 1998

CYBER TERRORISM

CYBER TERRORISM

IN THE CONTEXT OF GLOBALIZATION

Link to site here.

——————————————————————

Expert: Hackers penetrating industrial control systems

Digging out from infrastructure attacks could take months, Joseph Weiss says

By Grant Gross

March 19, 2009

IDG News Service – The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday.

(more…)

Powered by WordPress