Space Travel News  
Orchestrating A Catastrophic Denial Of Service

the next total war could take place in cyberspace within racks of computers across the world
by Loren B. Thompson
Arlington, Va. (UPI) Dec 29, 2008
Today, digital networks are so ubiquitous that their sudden disappearance would lead to economic collapse, and yet many people are barely aware they are relying on networks when they turn on the lights, go to the grocery store or seek medical care.

But the same features that make digital networks pervasive in everyday life also make them ready conduits for viruses, worms and other forms of malicious software that can destroy the wealth and welfare of unsuspecting users.

More ominously, clever attackers potentially can manipulate the system so it ceases to function entirely, leading to widespread deprivation, disorder and even defeat at the hands of a foreign power.

Recent trends in the evolution of cyber threats have led many experts to believe the danger is growing worse.

First, malicious software is proliferating at such an alarming rate that new applications may outnumber legitimate software releases.

Second, as these malicious programs are shared on the Internet, predators are becoming more subtle and sophisticated in their efforts.

Third, attacks increasingly seem to be originating from well-resourced operators such as governments rather than disaffected freelancers. And fourth, the tools for combating threats -- for detecting and blocking and tracing attacks -- are not keeping up with the danger.

In recent years the U.S. armed forces and intelligence agencies have faced rapidly escalating attacks on their information networks from countries such as Russia and China, and from a vast array of less capable perpetrators.

This facet of the cyber threat is largely invisible to the general public, because the government is not eager to advertise its vulnerabilities or how much it knows about who is mounting the attacks.

One measure of the danger, though, is the Bush administration's decision to launch a Comprehensive National Cybersecurity Initiative to protect government networks during its final year in office. The initiative was reported to be the biggest new item in the fiscal 2009 intelligence budget.

Military planners and intelligence analysts have long known that adversaries would seek to compromise U.S. networks in wartime. The idea of targeting key nodes in enemy networks has a long history that predates the Information Age, as reflected in the plan of the U.S. Army Air Forces to target electrical grids, refineries and communication nodes in World War II.

But the advent of digital networks has added a new twist to this strategy. In the past, the U.S. military was concerned mainly with "kinetic" attacks on its networks using high-explosive munitions, or gross "non-kinetic" effects such as the electromagnetic pulse generated by nuclear blasts. Today, it must also worry about more elusive dangers such as malicious software that undermines the reliability and security of vital systems.

(Next: Paralyzing the U.S. armed forces by cell phone and lap top)

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


The Virtual Fog Of Internet Warfare
Arlington, Va. (UPI) Dec 24, 2008
Digital networks are the nervous system of our modern technological civilization, essential to commerce and culture. The entire global economy, from banking to utilities to manufacturing to healthcare, relies on Internet-style communications. Even the U.S. military has reorganized for what it calls "network-centric warfare."







  • Space Pioneers Return For Thor Program's 50th Anniversary
  • Stennis to test Taurus II rocket engine
  • Aerojet Bipropellant Engine Sets New Performance Record
  • Cult spacecraft Part One: The Little Spaceplane That Couldn't

  • Arianespace To Launch Egyptian Satellite Nilesat 201
  • Boeing To Launch Fourth EO Satellite For Italy
  • Ariane 5 Achieves Another Successful Mission
  • Arianespace's Sixth Ariane 5 Of 2008 Completes Assembly

  • NASA seeks space shuttle display ideas
  • NASA seeks buyers for three shuttles
  • Endeavour Touches Down In Florida
  • Endeavour to make another overnight stop

  • ISS Astronauts Successfully Complete Spacewalk
  • Orbital Scoops Up Major Space Station Cargo Delivery Contract
  • NASA Awards Multi Billion Dollar ISS Supply Contracts
  • A Station Celebration

  • NASA finds clues to Mars mysteries
  • US gives green light for first commercial spaceport
  • China's First Multi-Functional Experiment System For Space Tribology
  • ISS Crew Marks 40th Anniversary Of First Human Moon Trip

  • China Launches Third Fengyun-2 Series Weather Satellite
  • China To Launch New Remote Sensing Satellite
  • HK, Macao Scientists Expected To Participate In China's Aerospace Project
  • China's Future Astronauts Will Be Scientists

  • Marshall Sponsors Four Student Teams In FIRST Robotics Competitions
  • Jump Like A Grasshopper
  • Rescue Robot Exercise Brings Together Robots, Developers, First Responders
  • Honda unveils leg assist machine for elderly

  • ISRO Eyes Lunar Landing In 2012 And Mars Mission In 2013
  • Mine life may show how Martian life exists
  • Ferric Oxides And Sulfates In Equatorial Regions Of Mars
  • Rock Varnish: A Promising Habitat For Martian Bacteria

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement