{"id":984,"date":"2008-05-15T14:18:49","date_gmt":"2008-05-15T22:18:49","guid":{"rendered":"\/?p=984"},"modified":"2008-05-15T14:26:11","modified_gmt":"2008-05-15T22:26:11","slug":"out-manned-and-out-gunned","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=984","title":{"rendered":"Out-manned and out-gunned"},"content":{"rendered":"<p><a href=\"http:\/\/idlogger.wordpress.com\/2008\/05\/13\/out-manned-and-out-gunned\/\">Jeff Bohren<\/a>\u00a0draws our attention to <a href=\"http:\/\/arstechnica.com\/news.ars\/post\/20080512-preparing-for-cyber-warfare-us-air-force-floats-botnet-plan.html\" class=\"broken_link\">this article<\/a>\u00a0on Cyber Offence\u00a0research being done by\u00a0the US\u00a0Air Force Cyber Command (AFCYBER).\u00a0 The article says:<\/p>\n<blockquote><p><em>&#8230;Williamson makes a pretty decent case for the military botnet; his points are especially strong when he describes the inevitable failure of a purely defensive posture. Williamson argues that, like every fortress down through history that has eventually fallen to a determined invader, America\u2019s cyber defenses can never be strong enough to ward off all attacks. <\/em><\/p>\n<p><em>And here, Williamson is on solid infosec ground-it\u2019s a truism in security circles that any electronic \u201cfortress\u201d that you build, whether it\u2019s intended to protect media files from unauthorized viewers or financial data from thieves, can eventually be breached with enough collective effort.<\/em><\/p>\n<p><em>Given that cyber defenses are doomed to failure, Williamson argues that we need a credible cyber offensive capability to act as a deterrent against foreign attackers. I have a hard time disagreeing with this, but I\u2019m still very uncomfortable with it, partly because it involves using civilian infrastructure for military ends&#8230;<\/em><\/p><\/blockquote>\n<p>Jeff then comments:<\/p>\n<blockquote><p>The idea (as I understand it) is to use military owned computers to launch a botnet attack as a retaliation against an attack by an enemy.<\/p>\n<p>In this field of battle I fear the AFCYBER is both out-manned and out-gunned. The AF are the go-to guys if you absolutely, positively need something blown up tomorrow. But a DDoS attack? Without compromising civilian hardware, the AF likely couldn\u2019t muster enough machines. Additionally the network locations of the machines they could muster could be easily predicted before the start of any cyber war.<\/p>\n<p>There is an interesting alternative if anyone from AFCYBER is reading this. How about a volunteer botnet force? Civilians could volunteer to download an application that would allow their computer to be used in an AFCYBER controlled botnet in time of a cyber war. Obviously securing this so that it couldn\u2019t be hijacked is a formidable technical challenge, but it\u2019s not insurmountable.<\/p><\/blockquote>\n<p>If the reason for having a botnet is because we should assume every system can be compromised,\u00a0don&#39;t we HAVE TO\u00a0assume the botnet can be compromised too?\u00a0\u00a0\u00a0Once we say\u00a0&#8220;the problem is not surmountable&#8221; we have\u00a0turned our back on the presuppositions that led to the botnet in the first place.\u00a0\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shouldn&#39;t we assume the botnet can be compromised too?<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[63,64],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/984"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=984"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/984\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}