Suche innerhalb des Archivs / Search the Archive All words Any words

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [infowar.de] Fierce cyber war predicted



On Wed, Mar 05, 2003 at 10:57:15AM +0100, Pluto wrote:

Servus Pluto,

könntest du deine Mails an infowar addressieren,
sonst haut das mit dem Sortieren nicht hin.

Danke Thomas

 : Infowar.de, http://userpage.fu-berlin.de/~bendrath/liste.html
 : -------------------------------------------------------------
 : 
 :   Salve,
 : 
 :   ein bisschen wundert mich die Naivitaet der Amis. Da haben die vor 10
 : Jahren die Sued-Iraker im stich gelassen und zugesehen als die Executionen
 : stattfanden. Jetzt wollen die den Generaelen erzaehlen, sie sollen den
 : gleichen Fehler machen. Da Araber eher noch auf Handschlag, als auf
 : Ewige-Gerichtsfilme stehen, ist das iritierend daemlich vom Pentagon.
 : 
 : http://www.cnn.com/2003/TECH/ptech/03/03/sprj.irq.info.war.ap/index.html
 : 
 : Fierce cyber war predicted
 : Strides in technology magnify info war potential
 : 
 : Monday, March 3, 2003 Posted: 10:49 AM EST (1549 GMT)
 : 
 : NEW YORK (AP) -- Imagine Iraqi commanders getting misleading text messages
 : on their cell phones. They appear to contain orders from Saddam Hussein
 : but are actually sent by the U.S. military in disguise, directing Iraqi
 : troops to a trap.
 : 
 : Or how about a radar that confuses the Iraqi air defense system by showing
 : U.S. bombers in the wrong locations, or heading in the wrong direction?
 : 
 : Although information operations has been a tool of warfare for centuries,
 : the Internet and other technologies are boosting capabilities -- and the
 : stakes. Already, the Pentagon has sent unsolicited e-mails to Iraqi
 : generals, encouraging them to defect.
 : 
 : "Warfare is less and less about pushing men and machines around the
 : battlefield and more and more about pushing electrons and photons," said
 : Loren Thompson, a defense analyst with the Lexington Institute in
 : Arlington, Virginia.
 : 
 : Comments hard to come by
 : 
 : The Pentagon has been mostly mum about what it can do and plans. Military
 : analysts wouldn't reveal specifics, fearful the Iraqis could develop
 : countermeasures.
 : 
 : "One thing I can tell you for sure: People who really know about these
 : programs can't tell you about these programs," said Bruce Berkowitz, a
 : senior analyst with Rand. But Berkowitz did spell out the goals: Shape
 : perceptions and get ahead of the enemy's decision-making intelligence
 : through spying, jamming and deception.
 : 
 : Chris Prosise, a Foundstone Inc. security researcher formerly with the Air
 : Force's Information Warfare Center, said the U.S. military has the same
 : tools available to computer hackers. A virus, for instance, can create
 : "backdoor" openings for later break-ins.
 : 
 : Information operations could also involve steering Iraqis to less-secure
 : communications channels for easier spying, such as by destroying the
 : infrastructure required for encryption. That can be done with bombs,
 : computer attacks or, perhaps, electromagnetic-pulse weapons, which disable
 : electronics with massive bursts of electricity.
 : 
 : During the Civil War, when signal flags were used, Union forces broke
 : Confederate coding schemes and diverted the South's troops by planting
 : bogus messages, Berkowitz said.
 : 
 : And during World War II, Allies fooled Germans by "leaking" battle plans
 : involving nonexistent troops.
 : Net helps deception
 : FACT BOX
 : Iraq can also hack U.S. computers from afar just as the Pentagon can break
 : into Iraqi systems. Defense is as much a part of the preparations.
 : 
 : The Internet makes deception easier. Getting away with it, though, can be
 : harder. Saddam can check Google for references to an Army division or read
 : local newspapers reporting on their units' whereabouts.
 : 
 : "These soldiers are still getting haircuts and shopping, and local
 : merchants are going to report massive drop-offs in sales due to troops
 : deploying," said John Pike, director of GlobalSecurity.org, a research
 : organization.
 : 
 : Sgt. Maj. Lewis Matson, a spokesman for the U.S. Central Command, would
 : only confirm two previously used "propaganda" methods.
 : 
 : For months, planes have been dropping leaflets over the "no-fly" zones,
 : warning Iraqi soldiers not to fire at American aircraft and stressing
 : Saddam's suppression of the Iraqi people. The 193rd Special Operations
 : Wing of the Pennsylvania Air National Guard also has been broadcasting
 : recorded radio messages from EC-130E Commando Solo aircraft.
 : 
 : One of the six Commando Solos, which can also broadcast television, has an
 : antenna for retransmitting live satellite feeds, said Senior Master
 : Sgt. Michael Kovach, an electronics instructor with the 193rd wing.
 : 
 : Its first use could come in Iraq.
 : Encouraging surrender
 : start quoteThey'll use this whole thing as a big training ground. They'll
 : experiment with everything they've been thinking about for a long time.end
 : quote
 : -- James Bamford, intelligence expert and author
 : 
 : One hypothetical use of such a transmitter could be to encourage surrender
 : by beaming into Iraq doctored video of Saddam being captured. Such tactics
 : could backfire, however, if a conflicting version were to appear via one
 : of the many information sources now available -- radio, Internet,
 : satellite TV.
 : 
 : Military officials privately acknowledge that they've sent e-mail to Iraqi
 : generals, encouraging dissent and defections and warning against following
 : any order to use weapons of mass destruction.
 : 
 : The U.S. Strategic Command, meanwhile, has the Joint Task Force for
 : Computer Network Operations available for computer attacks. The National
 : Security Agency also has invested heavily in this area over the past five
 : years, said intelligence expert and author James Bamford.
 : 
 : Bill Sweetman, a contributing editor with Jane's International Defense
 : Review, said the U.S. military benefits from its familiarity with the
 : Russian computer systems used by Iraqis.
 : 
 : The Chinese-built fiber-optic cables running Iraq's air defenses may be
 : harder to penetrate than the airwaves, but military hackers can do much
 : more -- and quietly -- once they are breached, Brookings Institution
 : fellow Peter Singer said.
 : Developing guidelines
 : 
 : There has also been talk of disrupting bank accounts through hacking,
 : though retired Air Force Col. Alan Campen, an editor of four books on
 : cyberwarfare, warns that doing so could hurt the global financial system.
 : 
 : "When you're launching a computer attack against somebody, how do you know
 : you've got them and haven't hurt yourself?" he asked.
 : 
 : President Bush already has signed a secret order to develop guidelines on
 : launching cyberattacks. Once bombs start dropping, Bamford said, the
 : military and intelligence communities will likely get all the authority
 : they want.
 : 
 : "They'll use this whole thing as a big training ground," Bamford
 : said. "They'll experiment with everything they've been thinking about for
 : a long time."
 : 
 : Copyright 2003 The Associated Press. All rights reserved. This material
 : may not be published, broadcast, rewritten, or redistributed. 
 : 
 :   Gruss
 : 
 : -- 
 :   Pluto   -   SysAdmin of Hades
 :   Free information! Freedom through knowledge. Wisdom for all!! =:-)
 :   2048/06.03.2002 0x5C838AFE AF91 050C 0CAA 8734 45F5  A3D0 E56A BC53 5C83 8AFE
 :   Phone: +49-17plutoUDM (+49-..) 
 : 
 : ---------------------------------------------------------------
 : Liste verlassen: 
 : Mail an infowar -
 de-request -!
- infopeace -
 de mit "unsubscribe" im Text.
 :