As a Maître Jaques, I amateurishly dabble in many fields, but have not the skill to bountifully harvest from any of them. But even a simpleton such as I can see that we will be an enigma to future generations, who might see the ruins of our great civilization, but have no surviving record of what we were capable of. Unlike the Egyptians, we don’t leave much of our record in stone. Unlike the Greeks and Romans, we don’t even leave it in paper anymore. We’re more like the Atlanteans (they did exist didn’t they???). What other ancient civilizations existed that we have no record of because they chose to store their records to “advanced”, and fragile, means of storage. ?
We’re in the early years of a cyberwar arms race. It’s expensive, it’s destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar treaties, as imperfect as they might be, are the only way to contain the threat.
If you read the press and listen to government leaders, we’re already in the middle of a cyberwar. By any normal definition of the word “war,” this is ridiculous. But the definition of cyberwar has been expanded to include government-sponsored espionage, potential terrorist attacks in cyberspace, large-scale criminal fraud, and even hacker kids attacking government networks and critical infrastructure. This definition is being pushed both by the military and by government contractors, who are gaining power and making money on cyberwar fear.
The danger is that military problems beg for military solutions. We’re starting to see a power grab in cyberspace by the world’s militaries: large-scale monitoring of networks, military control of Internet standards, even military takeover of cyberspace. Last year’s debate over an “Internet kill switch” is an example of this; it’s the sort of measure that might be deployed in wartime but makes no sense in peacetime. At the same time, countries are engaging in offensive actions in cyberspace, with tools like Stuxnet and Flame.
Arms races stem from ignorance and fear: ignorance of the other side’s capabilities, and fear that their capabilities are greater than yours. Once cyberweapons exist, there will be an impetus to use them. Both Stuxnet and Flame damaged networks other than their intended targets. Any military-inserted back doors in Internet systems make us more vulnerable to criminals and hackers. And it is only a matter of time before something big happens, perhaps by the rash actions of a low-level military officer, perhaps by a non-state actor, perhaps by accident. And if the target nation retaliates, we could find ourselves in a real cyberwar.
The cyberwar arms race is destabilizing.
International cooperation and treaties are the only way to reverse this. Banning cyberweapons entirely is a good goal, but almost certainly unachievable. More likely are treaties that stipulate a no-first-use policy, outlaw unaimed or broadly targeted weapons, and mandate weapons that self-destruct at the end of hostilities. Treaties that restrict tactics and limit stockpiles could be a next step. We could prohibit cyberattacks against civilian infrastructure; international banking, for example, could be declared off-limits.
Yes, enforcement will be difficult. Remember how easy it was to hide a chemical weapons facility? Hiding a cyberweapons facility will be even easier. But we’ve learned a lot from our Cold War experience in negotiating nuclear, chemical, and biological treaties. The very act of negotiating limits the arms race and paves the way to peace. And even if they’re breached, the world is safer because the treaties exist.
There’s a common belief within the U.S. military that cyberweapons treaties are not in our best interest: that we currently have a military advantage in cyberspace that we should not squander. That’s not true. We might have an offensive advantagealthough that’s debatablebut we certainly don’t have a defensive advantage. More importantly, as a heavily networked country, we are inherently vulnerable in cyberspace.
Cyberspace threats are real. Military threats might get the publicity, but the criminal threats are both more dangerous and more damaging. Militarizing cyberspace will do more harm than good. The value of a free and open Internet is enormous.
Stop cyberwar fear mongering. Ratchet down cyberspace saber rattling. Start negotiations on limiting the militarization of cyberspace and increasing international police cooperation. This won’t magically make us safe, but it will make us safer.
Mr. Schneier is without a doubt one of the experts in this field, and I have no desire to analyze his comments which I believe to be spot on. I do want to ponder, however on the impact that unmitigated cyberwar would have on modern society, which ties in neatly with my technophobe, luddite stance.
First off, in cyberwarfare, the entire Internet is potential battlefield. There is no Bull Run, there is no Flanders field, there is no Iwo Jima, there is no DMZ and there is no line of demarkation. The battle is anywhere and everywhere in nanoseconds. Cyberwarriors do not march for weeks or even days to an enemy’s digital citadel and lay siege. The enemy’s stronghold is simultaneously in the midst of its capital and on its borderland. The cyberwarriors emerge from the ether and disappear equally instantaneously. There are no signs of encampment, and only rarely do any of the individual combatants leave any footprints behind. On both sides, the most frail mage is the most powerful warrior.
Second, cyberwarfare is the most unhuman form of conflict yet invented by mankind. There is no adrenaline-charged rush toward an enemy that is just as real and scared as one’s self. There is only the anonymous clatter and click of the keyboard and mouse, with its own source of adrenaline, which can be felt when playing a first-person shooter, such as America’s Army. The same can be said of robot proxy (drone) warfare, a physical/cyber hybrid. One can engage and kill an enemy and the enemy can engage and kill the drone, but the enemy cannot engage and kill the pilot flying the drone from the other side of the planet. The enemy can smell the iron from the spilling blood of his comrade, but the pilot only sees a pixelated image on his screen, if he sees the dead at all. While this is advantageous as long as it is asymmetric, once hybrid warfare is conducted on mass scale by both sides, it will be the most horrific thing we have ever seen. Assume that drones are just as susceptible to compromise as any other computer system and then imagine a malware like Stuxnet that targets UAVs. As horrible as nuclear warfare is with its ability to wipe out entire cities in seconds, how much worse would be a squadron of drones flying slow and low picking off civilians and combatants alike?
Finally, our global society depends on a stable cyber infrastructure. Destroy cyberspace and you destroy Western civilization, or at least set it back a couple hundred years. We live in an electron-driven society. No Internet means no international commerce, which means no local commerce. If the entirety of cyberspace is a battlefield, since you can’t designate war zones in an abstract realm that has no borders, then you can’t keep the battle out of your front yard, and everyone who is resident in cyberspace is victim in cyberspace. Everything is intensified because it is omnipresent and instantaneous. The collective intelligence of mankind is weaponized and can be turned against anyone by a small set of bad actors. Since bots are set-and-forget, taking out the general, the lieutenant, the sergeant, or the private, does nothing to slow the tempo of battle. The conflict destroys reactors in the Middle East and in nanoseconds, turns across the ocean to down the electrical grid in New England. Insert your own catastrophe here.
What we end out with is societal collapse because of an over-reliance on tech. Many parts of the world may not be impacted at all, and those societies may rise over ours. Such is the cycle of human cultures. But the question I would pose is this: can we not re-cork this genie before he gets all the way out of the bottle? I don’t suggest we eschew all the wonderful advances we have made, but as a culture, we need a robust backup plan that depends a little less on what our grandparents didn’t have and a little more on what our great-great-grandparents did have.
IEEE Spectrum Digs Into the Future of Money: First time accepted submitter ArmageddonLord writes ” Small, out-of-pocket cash exchanges are still the stuff of everyday life. In 2010, cash transactions in the United States totaled US $1.2 trillion (not including extralegal ones, of course). There will come a day, however, when you’ll be able to transfer funds just by holding your cellphone next to someone else’s and hitting a few keys — and this is just one of the ways we’ll wean ourselves off cash. In ‘The Last Days of Cash’, a special report on the future of money, we describe the various ways that technology is transforming how we pay for stuff; how it’s boosting security by linking our biometric selves with our accounts; and how it’s helping us achieve, at least in theory, an ancient ideal — money that cannot be counterfeited.”
Read more of this story at Slashdot.
I don’t know if its my inner luddite or my inner libertarian that makes me hesitant of digital-only transactions. Historically, there have always been some type of physical medium used to facilitate the exchange of goods, whether it was a direct barter of something you want from someone else for something you have that they want, or money, whether a hard currency such as gold or silver, or a fiat currency such as Federal Reserve Notes (dollars). Even with a fiat currency such as the US Dollar, you have a failsafe; with dollars in hand, you can buy something when the digital infrastructure goes down. The same cannot be said of a cashless system. Granted, most transactions today do not involve real money; they are just bit transfers from your account to another account in the global banking grid. This requires a fair amount of confidence in the banking system’s ability to maintain systems integrity. Using the Slashdot example of fund exchanges via personal tech, you have to have stronger faith in another set variables:
- Cell phone providers, acting as clearing houses for transactions, will maintain systems integrity at least as well as traditional banks have.
- Their tech doesn’t fail (i.e. transactions process when signal is lost)
- Malware won’t be able to intercept your transactions and steal your identity
- All devices are compatible
Electromagnetic Interference caused K-11 KABOOM:
A Korean news website has revealed that in October last year a S&T Daewoo K11 exploded after one of its 20mm grenades was prematurely detonated. The soldier who was operating the gun suffered cuts on his hands and face. Ironically another problem with the gun, the poor lethality of the small 20mm grenades, saved the solider life.
The Korean Department of Defense attributes the problem to electromagnetic interference from the Fire Control System. Reading between the lines, it sounds like it may have been a software bug with the FCS.
I am troubled that it was even possible for the grenade to detonate. The grenade it supposed to be spin-armed, ensuring it has been fired a certain distance before detonating. Maybe a bug in the software (either on the grenade or on the FCS or both) allowed the grenade to be armed at a distance of zero, allowing it to be detonated in the barrel.
Kindly translated from Chosun.com by Uribury …
Electromagnetic wave interference caused K-11 rifle explosion
October 14th, 2011. A K-11 rifle exploded during field test.
Shooter, private second class Lee of ROKA 32nd div suffered some cuts and scrapes on his hands and face but not life threatening injures
This accident caused another delay of K-11 rifle production.
Early 2011 K-11’s poor quality control and lack of reliability caused production delay, after trouble shooting and more field test, it was said to begin production in november 2011.
And this accident messed all up.
Department of defense made a team to inspect this accident and recently announced electromagnetic wave interference between rifle FCS and 20mm ammo fuse caused the accident.
This is what happened. The transmitter which sends trigger signal to ammo fuse was not properly fixed because of design defect.
And the shooter squeezes trigger a little before fire, it interact with not properly positioned transmitter and send wrong signal to 20mm ammo fuse.
It caused 20mm round explosion in the barrel.
Fortunately K-11’s titanium barrel or 20mm ammo’s lack of lethality saved the soldier.
An official of DEPA(Defense Acquisition Program Administration) which under DOD said that all 246 already produced K-11 will be recalled and will change triggering system design, FCS program.
Plus, there will be improvement on short battery life in cold weather and laser range finding trouble on rainy day will be fixed on next version of the rifle.
Until June all the improvement will be examined through performance test and confirmation of technology study committee then will judge field the weapon or not.
[ Many thanks to uribury871 for emailing us the link and translation. ]
Advanced technology is great until it (literally) blows up in your face. Given the increase in solar activity and such, maybe this type of weapon should be TEMPEST rated.
A Community In Action: Are you a Luddite?: At trials in York, 17 Luddites were hanged and another 25 transported to Australia, while in … But both historians agree that today’s use of “Luddite” is wrong.
So 200 years after their most famous battle, why are we still peppering conversations with the word “Luddite“? It’s a popular retort to someone struggling to operate their new smartphone or refusing to buy the latest gizmo: “You’re such a Luddite.
See all stories on this topic »
Given this is the direction that most all new cars are going, it sort of makes me want a Caterham, based on a 50 year old Lotus design, and sold as a kit. There’s no better way to know your car than to build it yourself.
Ford Tests DIY Firmware Updates: wiredmikey writes “This month, Ford is borrowing something from the software industry: updates. With a fleet of new cars using the sophisticated infotainment system they developed with Microsoft called SYNC, Ford has the need to update those vehicles — for both features and security reasons. But how do you update the software in thousands of cars? Traditionally, the automotive industry has resorted to automotive recalls. But now, Ford will be releasing thirty thousand USB sticks to Ford owners with the new SYNC infotainment system, although the update will also be available for online download. In preparing to update your car, Ford encourages users to have a unique USB for each Ford they own, and to have the USB drive empty and not password protected. In the future, updating our gadgets, large and small, will become routine. But for now, it’s going to be really cumbersome and a little weird. Play this forward a bit. Image taking Patch Tuesday to a logical extreme, where you walk around your house or office to apply patches to many of the offline gadgets you own.”
Read more of this story at Slashdot.