If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Wired)   NSA snooping was only the beginning. Meet the spy chief leading us Into cyber-war. General Keith Alexander has been building a secret army capable of launching devastating cyberattacks. Now it's ready to unleash hell   (wired.com) divider line 65
    More: Followup, General Keith Alexander, NSA Snooping, spy, NSA, Cyber Command, control structure, security service, Israeli intelligence  
•       •       •

6395 clicks; posted to Main » on 13 Jun 2013 at 8:50 AM (1 year ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



65 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread

First | « | 1 | 2 | » | Last | Show all
 
2013-06-13 12:41:42 AM  
Should have said cyber-hell.

I had one hell of an 80s flashback during this headline.
 
2013-06-13 01:28:12 AM  

MadSkillz: Should have said cyber-hell.

I had one hell of an 80s flashback during this headline.


keep reading.  hopefully it will turn into an acid flashback.
 
2013-06-13 03:03:19 AM  
have to compete with the Chinese somehow .
 
2013-06-13 07:59:55 AM  
This is one of those times I wish I could photoshop....because the headline is begging for Russell Crowe in Gladiator telling his troops to unleash hell...but instead of Roman troops, there's a line of computer geeks.
 
2013-06-13 08:37:18 AM  
i.imgur.com

Secret army? It better look like this.
 
2013-06-13 08:53:55 AM  
Is it a secret army of extwa-owdinawy magnitude?
 
2013-06-13 08:54:05 AM  

sithon: have to compete with the Chinese somehow .


I agree.  If cyber warfare is possible, I'd rather we be on the leading edge, rather than a helpless victim down the road.
 
2013-06-13 08:54:28 AM  
So Snowdon will be getting 100 pizzas delivered to his door?
 
2013-06-13 08:54:48 AM  
Did they hire the required number narcissistic conspiracy theorists to "break" stories that were news in 2006 and the defect to China like a spineless coward? Because if they didn't then who will internet nerds fawn over as their hero?
 
2013-06-13 08:56:03 AM  
I didn't hear anyone cry, "HAVOC!"
 
2013-06-13 08:56:54 AM  
img.photobucket.com
 
2013-06-13 08:57:21 AM  
Not a big fan of it being run by a brazen criminal.
 
2013-06-13 08:58:42 AM  
The only way to fight this kind of surveillance is don't be interesting. We'll bore them to death.
 
2013-06-13 08:59:47 AM  
i981.photobucket.com
 
2013-06-13 08:59:49 AM  
. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.
 
2013-06-13 09:00:05 AM  
Real war:
"Oh no, somebody bombed my city, it'll take years to rebuild."

Cyber war:
"Oh noes! They haxx0red by computer! It'll take a whole hour to wipe the drive and reload a fresh backup."
 
2013-06-13 09:01:12 AM  

BarkingUnicorn: I didn't hear anyone cry, "HAVOC!"


For cyberwar you cry "HAV0K!!!11!!elventy!!"
 
2013-06-13 09:03:11 AM  

Prank Call of Cthulhu: Cyber war:
"Oh noes! They haxx0red by computer! It'll take a whole hour to wipe the drive and reload a fresh backup."


Hey, it's all fun and games 'til someone loses an IPad.
 
2013-06-13 09:04:09 AM  
In 2003, this person was also called "Slashdot editor".
 
2013-06-13 09:10:16 AM  
HACK THE PLANET

i.imgur.com
 
2013-06-13 09:12:08 AM  
OH MY GOD.

HE HACKED THE GIBSON!
 
2013-06-13 09:13:01 AM  

Prank Call of Cthulhu: Real war:
"Oh no, somebody bombed my city, it'll take years to rebuild."

Cyber war:
"Oh noes! They haxx0red by computer! It'll take a whole hour to wipe the drive and reload a fresh backup."


Except... for the American electrical power grid, which is controlled by an Internet accessible network for some reason...

/Parts are controlled by foreign entities.
//and shared with Canada.
 
2013-06-13 09:14:27 AM  
Is this the plot for Doom 4?
 
2013-06-13 09:18:02 AM  

ruinevil: Prank Call of Cthulhu: Real war:
"Oh no, somebody bombed my city, it'll take years to rebuild."

Cyber war:
"Oh noes! They haxx0red by computer! It'll take a whole hour to wipe the drive and reload a fresh backup."

Except... for the American electrical power grid, which is controlled by an Internet accessible network for some reason...

/Parts are controlled by foreign entities.
//and shared with Canada.


If you two are interested in the true SCIENCE behind hacking and want a no-frills look at the consequences of inadequate network security, pick up a copy of the educational film  Live Free or Die Hard from your local library!
 
2013-06-13 09:18:04 AM  

BarkingUnicorn: I didn't hear anyone cry, "HAVOC!"


Cry 'Goddammitsomuch', and let slip the dogs of war, that this foul deed shall smell above the earth with carrion men, groaning for burial...
 
2013-06-13 09:19:33 AM  
deddog.com
 
2013-06-13 09:20:01 AM  
Ok, I know this is a stretch, but hypothetically wouldn't having this stockpile of information in the PRISM system actually make us horribly tactically vulnerable if some foreign government (China) were able to access it?

I'm off to go buy some reynold's wrap now...
 
2013-06-13 09:21:59 AM  
I love how they make things seems like they are super ultra high tech when honestly most hacks and intrusions happen because places do not even take the simplest of steps to secure their information.

Open ports on firewalls, failed group policies, to not updating software regularly....all these very simple things that can prevent intrusions on a most basic level yet when you approach places about implementing them they either scoff at the cost or biatch and moan that because Johnny over in engineering would be inconvenienced by them they should not do them.

Nothing in this world security is going to change until people start taking proactive steps towards securing networks, instead of reactive when the shiat hits the fan.

And honestly the same goes for intelligence gathering. More intelligence could be gathered by utilizing the NSA and CIA by infiltrating networks, cultivating people contacts and having actual agents in the field than could ever be gathered by trying to analyze and formulate algorithms based on your cat postings on facebook....but that would be a proactive step compared to the farking idiotic reactive steps we do now.
 
2013-06-13 09:22:36 AM  
Well, TFA had me on the edge of my seat to the very end.  Pretty cool stuff.
 
2013-06-13 09:25:07 AM  

BarkingUnicorn: Well, TFA had me on the edge of my seat to the very end.  Pretty cool stuff.


I'll wait for the movie, thankyouverymuch.
 
2013-06-13 09:27:18 AM  

Harv72b: Is it a secret army of extwa-owdinawy magnitude?


i3.ytimg.com

DO YOU THINK THIS IS A CHEWADE? YOU RACK DISCIPWINE. WE NEED TOTAL CONCENTWATION!
 
2013-06-13 09:27:23 AM  

sithon: have to compete with the Chinese somehow .


Black Lotus reporting to thread.
 
2013-06-13 09:31:06 AM  

Torrent of Rubbish: If you two are interested in the true SCIENCE behind hacking and want a no-frills look at the consequences of inadequate network security, pick up a copy of the educational film  Live Free or Die Hard from your local library!


2.bp.blogspot.com
 
2013-06-13 09:31:32 AM  

vudukungfu: . To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.


Apparently you're doing it wrong. You need a copper hat.
 
2013-06-13 09:33:14 AM  

hardinparamedic: Harv72b: Is it a secret army of extwa-owdinawy magnitude?

[i3.ytimg.com image 480x360]

DO YOU THINK THIS IS A CHEWADE? YOU RACK DISCIPWINE. WE NEED TOTAL CONCENTWATION!


Ah, but you'll get to hack fifty, maybe sixty people.

media-cache-ec4.pinimg.com
 
2013-06-13 09:37:53 AM  

vudukungfu: . To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.


I just wrapped my modem and router in tin foil too, after reading that...
 
2013-06-13 09:37:59 AM  

runescorpio: vudukungfu: . To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.

Apparently you're doing it wrong. You need a copper hat.


How well would chain mail work as a Faraday cage?
 
2013-06-13 09:40:47 AM  

runescorpio: vudukungfu: . To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.

Apparently you're doing it wrong. You need a copper hat.


If you did that it be stolen so someone could sell it at the scrap merchants.
 
2013-06-13 09:41:12 AM  
Well, they are not going to flee in their moment of triumph.
 
2013-06-13 09:48:31 AM  

Sock Ruh Tease: hardinparamedic: Harv72b: Is it a secret army of extwa-owdinawy magnitude?

[i3.ytimg.com image 480x360]

DO YOU THINK THIS IS A CHEWADE? YOU RACK DISCIPWINE. WE NEED TOTAL CONCENTWATION!

Ah, but you'll get to hack fifty, maybe sixty people.

[media-cache-ec4.pinimg.com image 320x240]


shadoka.files.wordpress.com
 
2013-06-13 10:04:02 AM  
In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government's forefinger. "What we see is an increasing level of activity on the networks," he said at a recent security conference in Canada. "I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in."

This has to be a troll article/satire right?
 
2013-06-13 10:06:17 AM  
No Dittybopper yet? I thought SigInt was his bag, baby.


i1.ytimg.com

Oh wait, nm...
 
2013-06-13 10:17:31 AM  
Yeah, good luck with that. I'm behind seven proxies.
 
2013-06-13 10:28:55 AM  
FTFA: The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran's nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

Look, it's SCADA. All caps. Because it stands for something. Acronyms, how do they work? To be perfectly honest, most of our pipelines and power plants use technology older than dirt. Or at least, from the era when the interwebz first began. A good amount do their best to keep up with the times but, like anything having to do with politics and technology, everything takes time and money and a lot of old people who don't know that most folks don't use dial-up any more to approve sht.


Torrent of Rubbish: If you two are interested in the true SCIENCE behind hacking and want a no-frills look at the consequences of inadequate network security, pick up a copy of the educational film  Live Free or Die Hard from your local library!


The BEST part of that entire movie was when what'shisface redirects "ALLTHENATGASES" to flow in reverse, at the flip of a switch, back IN to the power plant. So much fail in this... Would it have been so hard to call up someone who knows something about a natural gas pipeline to ask about pressures, control valves, etc?
 
2013-06-13 10:34:01 AM  

JustHereForThePics: runescorpio: vudukungfu: . To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

And all I have is a tin foil hat.

Apparently you're doing it wrong. You need a copper hat.

How well would chain mail work as a Faraday cage?


Actually water works way better than most metals at reflecting and scattering point to point signals.  I would recommend putting your electronics under at least 3 ft. of water, preferably with ice as that helps with the scattering.  Works well with human heads too.
 
2013-06-13 10:37:08 AM  
So...this general is so powerful and secret that I'm reading about it on fark?

That's some secret.
 
2013-06-13 10:38:01 AM  

IdBeCrazyIf: I love how they make things seems like they are super ultra high tech when honestly most hacks and intrusions happen because places do not even take the simplest of steps to secure their information.

Open ports on firewalls, failed group policies, to not updating software regularly....all these very simple things that can prevent intrusions on a most basic level yet when you approach places about implementing them they either scoff at the cost or biatch and moan that because Johnny over in engineering would be inconvenienced by them they should not do them.

Nothing in this world security is going to change until people start taking proactive steps towards securing networks, instead of reactive when the shiat hits the fan.

---

While you are correct in that we must prioritize simple steps that can ensure proper security, that does not take cyberwarfare off the table.  Advanced persistent threats are successful because they are long-duration, organized and objective oriented.  That is where high-tech countermeasures are required because correlating activity from many different attack vectors over a long duration of time is something most companies cannot do effectively.  That can lead to the loss of intellectual property, trade secrets, insider info, etc. which are great ways to wage economic warfare.

Add to that the fact that a lot of our infrastructure is on outdated gear - and that is not as easily replaceable as turning on windows updates on your laptop for flashing the firmware on a few routers.

Another example of how cyberwarfare can be waged effectively is how Russia went into Georgia.  The power grid went down, communications down, and then the shelling and tanks came in.  If you want to invade a country these days, you start at the cyber level.  I do not think securing our country's rather old infrastructure ex post facto is as easy as you might think.  The USA was able to pioneer a lot of tech related infrastructure and now that stuff is older than some of the 'younger' countries.  Think about how old some of our pumping, power and transit stations are now and what kind of critical gear is probably in place that could be vulnerable to rather trivial attack..
 
2013-06-13 10:40:48 AM  

WTF Indeed: Did they hire the required number narcissistic conspiracy theorists to "break" stories that were news in 2006 and the defect to China like a spineless coward? Because if they didn't then who will internet nerds fawn over as their hero?


45 replies and no bites yet...bummer. Keep your chin up, its not even noon yet.
 
2013-06-13 10:50:25 AM  
FTA:
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings-the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras.

Sounds a lot like a Chinese manga or manhua, I think the title was High School Shock. The whole city was built to observe a kid with special powers.
 
2013-06-13 10:58:03 AM  

Prank Call of Cthulhu: Real war:
"Oh no, somebody bombed my city, it'll take years to rebuild."

Cyber war:
"Oh noes! They haxx0red by computer! It'll take a whole hour to wipe the drive and reload a fresh backup."


Except that it turns out to be.  "Oh wait, the backup is f-ed, too...  How far back does this go?  Okay, we'll rebuild from scratch.  Wait, what do you mean it's hacked again? *3 weeks of investigation later* How did they manage to insert the compromise code into the firmware of the hard drive?"

Or the even more scary: "Nope, doesn't look like we were affected by that, sir."

It's not like conventional war.  If it's done right, you don't even know you're under attack until it's too late, and everything from the inside out is compromised six ways to Sunday.
 
Displayed 50 of 65 comments

First | « | 1 | 2 | » | Last | Show all

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »






Report