• tags: cyberwar-skepticism

    • The Spectrum of Cybermalfeasance
    • The Spectrum of Cybermalfeasance

      Level of threat to national security: greatest to least 1. INFORMATION WARFARE State-sponsored use of computers in military action.

      2. INFORMATION COUNTER INTELLIGENCE State-sponsored use of computers to gain knowledge on a foe.

      3. CYBERTERRORISM Use of computers to cause terror, death, destruction or massive economic turmoil, often by a party not affiliated with any state.

      4. CYBER ORGANISED CRIME Use of computers by a cartel-like group for the purpose of stealing or trafficking, usually money.

      5. INFORMATION VENDETTAS Use of computers, usually by an insider or sanctioned by an insider, to sabotage an organisation to create public embarrassment or to gain at the expense of that organisation.

      6. CYBERCRIME Use of computers to steal money, credit card data or personal information for use in extortion schemes or to gain notoriety as a hacker.

      7. CYBERHOOLIGANISM Using computers for digital vandalism and low-level destruction, such as Web site defacement, virus propagation or “hacktivism” – that is, using those tools to get a message across.


  • tags: cyberwar-skepticism

    • these groups have not yet used cyber attack capabilities in any significant way to cause casualties or actually terrorize anyone.
    • The US government was a relatively early advocate of a strict definition of cyber terrorism, as nearly a decade ago they were calling it as “a criminal act perpetrated through computers resulting in violence, death and/or destruction, and creating terror for the purpose of coercing a government to change its policies.” Not defacing a webpage, not flooding a website (even of the South Korean president) and not stealing credit card information.
    • For decades, the rule of thumb for intelligence analysts has been that adversaries with motives for damaging cyber attacks do not have the capabilities, while those with the capabilities do not yet have the motives.   A large-scale cyber attacks is more difficult than is generally believed and few adversaries have both the motive and capability.
    • their leadership tends to be conservative and they tend to stick with what they know will work – suicide bombers, road-side bombs, and kinetic assaults.  These actually kill and terrorize people which, as yet, no cyber attack has accomplished.
    • Skepticism, however, has been an excellent analytical tool for two decades and will remain a healthy response when anyone, whether your local newspaper or a religious extremist, blathers about cyber terrorism.

Posted from Diigo. The rest of my favorite links are here.