Posted on 07/08/2009 7:41:05 AM PDT by HD1200
Do we retaliate for cyber attacks with cyber attacks?
If not - WHY NOT?
How do we cyber attack a country that’s in the stone age?
Is there a point or an incident that you are talking about or was it a rhetorical and hypothetical question?
Because we HOPE for CHANGE and then apologize for wht they have done to US.
“Do we retaliate for cyber attacks with cyber attacks? “
We sent them ZOTs.
Obama: “We’re sorry you killed us.”
When referring to Hussein, always include his accomplices in the US Congress. They’re all in the pot together, IMO.
VOTE THEM OUT
If we could just channel them to certain sites - DU and the “love 0bama sites” come to mind.
One would need to be certain where the attack originated.
Oh, wait...
“One would need to be certain where the attack originated.”
IMHO I am certain we do know where they originated from. The “thought to originate” disclaimer always present in a news report is for public consumption.
I don’t know why we don’t just completely shut down their systems with our own attacks when they pull this crap and advertise it is us doing it!
the attacks were carried out by North Korean or pro-Pyongyang forces. U.S. officials so far have refused to publicly discuss details of the attack or where it might have originated.
One thing that we do know is that Obama will do nothing.
Cyber attacks are technology based. If we attack, our counter-attack in a non-life threatening event (ie. we get hacked, we counter-hack) we expose our technology to those who will analyze and learn from our technology.
However, if we are in a ‘war’ situation, and we have cyber technology the enemy does not have (or have a defense) then our attack will be successful.
Little ‘tit for tat’ counter-hacks does nothing but let the enemy know where his vulnerabilities are, so he can fix them and make a more robust target.
Now, we get ‘cyber-attacks’ all the time, we find them, we fix whateve exploit that was used. These ‘Cyber-attacks’ come from China, Russia and the Middle East - some may be goverment backed, but most (IMHO) are simply college kids attempting to see how far they can go before they get caught. Sometimes they get lucky and make off with tons of material - but here’s the catch.
Say you have some technical drawings and specifications - are they real or are they disinformation? The only way to find out, is to expose yourself as the attacker. Who do you share them with? If you show up in China with what appears to be Secret or classified material from the USA, do you suppose they will be suspicious of how you got it?
I’d say that in the meanwhile, we just bolster our defenses and learn from the attacks. Meanwhile, we develop cyber-weapons and keep them under wraps until such a time as they are needed.
I suspect it's happening.
I would rickroll every computer in the North Korean government and military!
“If we attack, our counter-attack in a non-life threatening event (ie. we get hacked, we counter-hack) we expose our technology to those who will analyze and learn from our technology.”
So those doing the attacking against us don’t share your concern or they are stupidly showing us their capability? I think technology and methods to exploit changes so fast that it doesn’t matter what cards we or they show in an attack.
I want to see North Korea go even darker than it already is the next time they pull this.
“I suspect it’s happening.”
Maybe prior to 1/20/2009 it was.....
From what I’ve been able to gather, the attacks that have done the most damage, are due to negligence on OUR part. For example, people using USB sticks on their home PC and then taking the infected USB stick to ‘work’ and sticking a virus into their gov’t PC.
Yes, we’d all love to believe that the USA’s Military PC security is tight and frequenctly scanned. However, that is simply not the case. Gov’t PC’s are not on the forefront of performance (as you can see whenever you to to any Gov’t agency) and the IT anti-virus scans are few and far between. Many independant systems simply have little or no virus protection at all.
Consider the tank. Most of them have their own PC’s for running targetting, navigation and other programs. Many also have the ability to do other things - now, how often do you think that every tank’s internal PC is scanned for virus’s? And, yes; pretty much every PC has at least one USB port.
Now multiply that by the number of stand-alone PC’s used by the military, field testers, office PC’s, remote test stations, mobile artilery.
All it takes is one careless GI with a USB stick, and he can infect a dozen machines. The other GI’s using military issued USB sticks spread the virus within the battalion’s PC while doing their jobs.
I’m more concerned about that, than I am North Korea - at least at this stage of things.
These recent events sound more like denial of service attacks - overwhelming hits on servers. I should think we could amplify their attacks on us by a factor of 100 or more against their servers.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.