West Point and Marines Launch Open Cyber Conflict Journal 31
rumint writes: The Army Cyber Institute at West Point and the Marine Corps Cyberspace Command just launched an open journal studying cyber conflict — Cyber Defense Review. It focuses on strategy, operations, tactics, history, ethics, law and policy in the cyber domain. The Cyber Defense Review is positioning itself as the leading online and print journal for issues related to cyber conflict for military, industry, professional and academic scholars, practitioners and operators interested providing timely and important research to advance the body of knowledge in an inherently multi-disciplinary field.
Re: (Score:2, Insightful)
First, way to post everything as AC.
Second: Really? Two people, in two separate incidents are dead, and a few more wounded and there is "massive panic in Denmark"? Are you fucking kidding me?
That's the same stupidity that had schools 4000 km away go on lockdown because a lone gunman killed one person on a "rampage" on Parliament Hill in Canada.
Re: (Score:2)
OMG The situation is totally worse. The lone gunman killed somebody, then took a taxi to another location and killed someone else and wounded some other people.
We better just lock down the whole country and do a cavity search on everyone.
why is this even a thing??? (Score:2)
i dont want the internet to go down everytime some random country wants to get in a pissing contest with another country. This doesnt mean we dont need to take cyber security seriously, we do. but the issue is that cyber warfare should not even be a blip on the radar as anything related to the military should NOT be on the internet!
Re: (Score:3)
But there are things that need to be communicated between separate entities, and while it may not be War Games incarnate, I can see how malicious disruption of some things like scheduled bank transfers, etc. could cause some panic and mayhem. Think of it as the newest layer of SIGINT
Re:why is this even a thing??? (Score:4, Insightful)
My understanding is that the military does have a completely isolated network for critical combat communication, but like any other global-scale organization, they're still probably reliant on the now-civilian internet because of the efficient communication it provides. For instance, communication with contractors, other countries' military forces, and so on are all vital for day to day operations, and probably can't be accomplished with a military-only system because of the sheer scale and scope it would require.
I just don't think it's as simple as saying "the military should not be on the internet". They either have to try to use it safely and securely, build a completely separate and parallel internet, or go without it. Granted, there's obviously a percentage of material that should always be air-gapped for maximum security, but the bulk of bureaucratic day to day communication and coordination only needs to be reasonably secure, and can probably safely live on the standard internet given reasonable precautions.
Re: (Score:3)
My understanding is that the military does have a completely isolated network for critical combat communication, but like any other global-scale organization, they're still probably reliant on the now-civilian internet because of the efficient communication it provides. For instance, communication with contractors, other countries' military forces, and so on are all vital for day to day operations, and probably can't be accomplished with a military-only system because of the sheer scale and scope it would require.
I just don't think it's as simple as saying "the military should not be on the internet". They either have to try to use it safely and securely, build a completely separate and parallel internet, or go without it. Granted, there's obviously a percentage of material that should always be air-gapped for maximum security, but the bulk of bureaucratic day to day communication and coordination only needs to be reasonably secure, and can probably safely live on the standard internet given reasonable precautions.
They have more than a few, and I seriously doubt very much reliance on the Internet because even mediumish sized businesses use private connections between themselves rather than some VPN over the public Internet for critical communications. I'm not saying they don't use the Internet, because you can get to it from their non-secure networks, but their private networks are comprehensive. Anything classified is on those air gapped networks.
Anyway, the purpose of our military is to defend US. They've got th
Re: (Score:1)
Keep mission critical stuff offline, or on a network not running standard protocols
Well, (depending on the mission) "mission critical stuff" must be online and use standard protocols... that's the whole idea with military networks actually!
As a Greek, in case of a military conflict, i depend on standard protocols to communicate with other Greeks (and NATO allies), plus anyone trying to communicate must be online...
i dont want the internet to go down everytime some random country wants to get in a pissing contest with another country. This doesnt mean we dont need to take cyber security seriously, we do. but the issue is that cyber warfare should not even be a blip on the radar as anything related to the military should NOT be on the internet!
Oh... "the internet"...
The "military mission critical networks" (usually) are not in "the internet" - CYBER attacks does not only mean internet attacks (or "internet" does not o
Re: (Score:3)
Airgaps don't work, Stuxnet proved you can still take down an airgapped network (face it - airgaps also mean old vulnerabilities don't get patched because it's way less convenient).
And proprietary protocols? They exist too.
But you know what? All this specialty stuff costs way more money. And then you wonder why the military is spending $200 on a network card that can barely do Gigabit speeds, when they can buy a GigE cards f
Re: (Score:3)
Yes, they do.
It's not whether an attack is still possible. It's about reducing the number of people who can successfully attack it.
Stuxnet, as far as I know, depended upon someone physically smuggling in a USB device loaded with 0 day exploits.
So the airgap worked. But their physical security failed.
Not to mention any means of verifying what is running on their systems.
Re: (Score:2)
You dominate a domain by making it irrelevant (Score:2)
Hard to understand why any of this is complicated in a real full out war.
Smash the enemy communications networks and they're not on the internet at all at that point. What is left is whatever your own military hardened communications networks are... and all you have to do there is keep the battered remnants of the enemy out of your own systems.
That is assuming a small engagement.
Assuming a big one... the issue is best left to communications specialists that will be tasked with keeping systems linked to the
I can help ... (Score:2)
Target and Sony and some banks were hacked.
The end.
Now, let's start the journal about how we rip out all this candy-ass Internet shit and do it right this time.
Re: (Score:2)
Defending against Cyber Conflict? (Score:2)