Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

re: Cyber attacks against America
7/8/09

Posted on 07/08/2009 7:41:05 AM PDT by HD1200

Do we retaliate for cyber attacks with cyber attacks?

If not - WHY NOT?


TOPICS: Your Opinion/Questions
KEYWORDS: cyberattacks; cyberterrorism
Navigation: use the links below to view more comments.
first 1-2021-26 next last

1 posted on 07/08/2009 7:41:06 AM PDT by HD1200
[ Post Reply | Private Reply | View Replies]

To: HD1200

How do we cyber attack a country that’s in the stone age?


2 posted on 07/08/2009 7:42:26 AM PDT by Daveinyork
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200

Is there a point or an incident that you are talking about or was it a rhetorical and hypothetical question?


3 posted on 07/08/2009 7:42:48 AM PDT by VRWCmember
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200

Because we HOPE for CHANGE and then apologize for wht they have done to US.


4 posted on 07/08/2009 7:43:21 AM PDT by Dacula (Evil succeeds when good men do nothing. Lets do something.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200

“Do we retaliate for cyber attacks with cyber attacks? “

We sent them ZOTs.


5 posted on 07/08/2009 7:44:03 AM PDT by PetroniusMaximus
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dacula

Obama: “We’re sorry you killed us.”


6 posted on 07/08/2009 7:44:18 AM PDT by John W
[ Post Reply | Private Reply | To 4 | View Replies]

To: John W; freekitty

When referring to Hussein, always include his accomplices in the US Congress. They’re all in the pot together, IMO.

VOTE THEM OUT


7 posted on 07/08/2009 7:46:29 AM PDT by ExTexasRedhead
[ Post Reply | Private Reply | To 6 | View Replies]

To: HD1200

If we could just channel them to certain sites - DU and the “love 0bama sites” come to mind.


8 posted on 07/08/2009 7:51:09 AM PDT by The Sons of Liberty (July 2009 - socialist occupied America - I will take my Country Back!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: VRWCmember
Government Web sites attacked; N. Korea suspected
9 posted on 07/08/2009 7:51:56 AM PDT by DJ MacWoW (Make yourselves sheep and the wolves will eat you. Ben Franklin)
[ Post Reply | Private Reply | To 3 | View Replies]

To: HD1200

One would need to be certain where the attack originated.


10 posted on 07/08/2009 7:52:34 AM PDT by DJ MacWoW (Make yourselves sheep and the wolves will eat you. Ben Franklin)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200
Yes, let's cripple the North Koreans financial system...

Oh, wait...

11 posted on 07/08/2009 7:53:47 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DJ MacWoW

“One would need to be certain where the attack originated.”

IMHO I am certain we do know where they originated from. The “thought to originate” disclaimer always present in a news report is for public consumption.

I don’t know why we don’t just completely shut down their systems with our own attacks when they pull this crap and advertise it is us doing it!


12 posted on 07/08/2009 7:59:10 AM PDT by HD1200
[ Post Reply | Private Reply | To 10 | View Replies]

To: HD1200
Well they aren't saying that it's a certainty.

the attacks were carried out by North Korean or pro-Pyongyang forces. U.S. officials so far have refused to publicly discuss details of the attack or where it might have originated.

One thing that we do know is that Obama will do nothing.

13 posted on 07/08/2009 8:02:00 AM PDT by DJ MacWoW (Make yourselves sheep and the wolves will eat you. Ben Franklin)
[ Post Reply | Private Reply | To 12 | View Replies]

To: HD1200

Cyber attacks are technology based. If we attack, our counter-attack in a non-life threatening event (ie. we get hacked, we counter-hack) we expose our technology to those who will analyze and learn from our technology.

However, if we are in a ‘war’ situation, and we have cyber technology the enemy does not have (or have a defense) then our attack will be successful.

Little ‘tit for tat’ counter-hacks does nothing but let the enemy know where his vulnerabilities are, so he can fix them and make a more robust target.

Now, we get ‘cyber-attacks’ all the time, we find them, we fix whateve exploit that was used. These ‘Cyber-attacks’ come from China, Russia and the Middle East - some may be goverment backed, but most (IMHO) are simply college kids attempting to see how far they can go before they get caught. Sometimes they get lucky and make off with tons of material - but here’s the catch.

Say you have some technical drawings and specifications - are they real or are they disinformation? The only way to find out, is to expose yourself as the attacker. Who do you share them with? If you show up in China with what appears to be Secret or classified material from the USA, do you suppose they will be suspicious of how you got it?

I’d say that in the meanwhile, we just bolster our defenses and learn from the attacks. Meanwhile, we develop cyber-weapons and keep them under wraps until such a time as they are needed.


14 posted on 07/08/2009 8:02:33 AM PDT by Hodar (Who needs laws .... when this "feels" so right?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200
Do we retaliate for cyber attacks with cyber attacks?

I suspect it's happening.

15 posted on 07/08/2009 8:06:41 AM PDT by GOPJ (Central park didn't hit 85 degrees in June this year - last time was 1916. Al Gore is nuts.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HD1200

I would rickroll every computer in the North Korean government and military!


16 posted on 07/08/2009 8:10:36 AM PDT by silverleaf (Save the earth. It's the only planet with chocolate!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hodar

“If we attack, our counter-attack in a non-life threatening event (ie. we get hacked, we counter-hack) we expose our technology to those who will analyze and learn from our technology.”

So those doing the attacking against us don’t share your concern or they are stupidly showing us their capability? I think technology and methods to exploit changes so fast that it doesn’t matter what cards we or they show in an attack.

I want to see North Korea go even darker than it already is the next time they pull this.


17 posted on 07/08/2009 8:16:28 AM PDT by HD1200
[ Post Reply | Private Reply | To 14 | View Replies]

To: GOPJ

“I suspect it’s happening.”

Maybe prior to 1/20/2009 it was.....


18 posted on 07/08/2009 8:17:31 AM PDT by HD1200
[ Post Reply | Private Reply | To 15 | View Replies]

To: HD1200

From what I’ve been able to gather, the attacks that have done the most damage, are due to negligence on OUR part. For example, people using USB sticks on their home PC and then taking the infected USB stick to ‘work’ and sticking a virus into their gov’t PC.

Yes, we’d all love to believe that the USA’s Military PC security is tight and frequenctly scanned. However, that is simply not the case. Gov’t PC’s are not on the forefront of performance (as you can see whenever you to to any Gov’t agency) and the IT anti-virus scans are few and far between. Many independant systems simply have little or no virus protection at all.

Consider the tank. Most of them have their own PC’s for running targetting, navigation and other programs. Many also have the ability to do other things - now, how often do you think that every tank’s internal PC is scanned for virus’s? And, yes; pretty much every PC has at least one USB port.

Now multiply that by the number of stand-alone PC’s used by the military, field testers, office PC’s, remote test stations, mobile artilery.

All it takes is one careless GI with a USB stick, and he can infect a dozen machines. The other GI’s using military issued USB sticks spread the virus within the battalion’s PC while doing their jobs.

I’m more concerned about that, than I am North Korea - at least at this stage of things.


19 posted on 07/08/2009 8:25:15 AM PDT by Hodar (Who needs laws .... when this "feels" so right?)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Hodar

These recent events sound more like denial of service attacks - overwhelming hits on servers. I should think we could amplify their attacks on us by a factor of 100 or more against their servers.


20 posted on 07/08/2009 8:27:51 AM PDT by HD1200
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson