Here's the importance of Cyber Warfare

Started by Dolos6 pages

Here's the importance of Cyber Warfare

I. If I hack into your highest military database, I control your missile defense system and all operations you're running. If I hack into thousands of your networks using self-recalibrating automated subroutines, I run your whole economic infrastructure on top of the aforementioned seizure of governmental operations.

II. I prevent this from happening to my nation by putting all networks into self-adapting, self-evolving automated firewalls that will take any hacker millions of years to crack due to the pure algorithmic complexity to trace the program's source while the firewall is rerouting it from said source 20 trillion times per second.

China will still win.

Originally posted by Tzeentch._
China will still win.
中国将永远是赢家。

Re: Here's the importance of Cyber Warfare

Why is this military database connected to the internet?

Re: Here's the importance of Cyber Warfare

Originally posted by Dolos
I. If I hack into your highest military database, I control your missile defense system and all operations you're running. If I hack into thousands of your networks using self-recalibrating automated subroutines, I run your whole economic infrastructure on top of the aforementioned seizure of governmental operations.

That's not how it works.

There exists and entire area of Cyber and Physical Security known as "Secure System Controls". These integrate PLCs, VPNs, firewalls, and isolated networks that literally cannot communicate to anything outside their network because it is physically impossible to connect (no Wi-Fi, physical connection points, and a physically isolated network).

The idea that anyone could "hack" into a missile network and launch some of the US ICBMs with 10+ Megaton Warheads is not only preposterous, it is fear-mongering.

To put it more directly, the missiles cannot be launched without several authentication mechanisms being hacked AND physical interaction. So unless a hacker cannot only hack all layers of security (hilariously impossible even with every single computing device in the world being used at once to brute force hack one or more of those layers: we are talking hundreds of trillions of years required for just one layer) but also be at the physical controls (which are completely isolated and require you get past isolated authentication mechanisms, physical security measures, automated security measures, and several layers of human security).

Here's a story: one of my college mentors was hired by the Navy to both hack and "socially engineer" his way into a secure naval facility. It was the type of facility that was not even "top-secret" secured. He made his way into the facility and got as far as being able to physically touch a switch closet (which required him to get passed 3 layers of physical security including "picking" a lock..let's forget about the cameras...he did not go into details how he got around that). This project of his took 2 months of planning to execute, insider knowledge of his target from top-level Naval Officers (because they hired him to do this as part of a secure audit process that routinely tests their security), and his years of experience of hacking and infiltrating secure facilities.

Here's what happened when he got to a switch closet to start some of his real hacking: he ended up with a gun in his back by a guard. Based on how he tells the story, he was pretty dang close to getting shot to death (being shot vs. being shot with the specific purpose of killing the target is obviously different). He had to have his orders on his physical person. If he reached for them, he would have been shot. There was a particular procedure he had to complete that got him out of that situation (I believe it was announcing his name, assignment, and orders).

Then the guard's CO? arrived to pick up and confirm his orders (they were called in and he was the picked up and "debriefed"😉. He was caught because he did something/ANYTHING to the switches which set off security servce. This "network state" is monitored by IDS/IPS.

This is at a lower-level military facility. The security measures at a nuke weapons facility will be much higher: possibly the most secure facilities, in the world.

I hope that clears up any notion you had that "hacking nukes" was feasible: it's just Hollywood Bullsh*t. An infinite amount of 0-Days will never get you into a network that is physically isolated from the rest of the world.

TL: DR America! F*** YEAH! estahuh

Originally posted by Symmetric Chaos
Why is this military database connected to the internet?

Because this is Hollywood? rofl

Solution to hacking isolated networks = EMP projectile launched from hypersonic stealth craft and detonated near the facility, followed by an altered reboot that gives you access.

Solution operating manual switches required = Recon seal team with access to tech that can jam signals allowing for alteration of the aforementioned reboot of nuclear systems. They'd be there for weeks in secret during the recalibration of the nuclear launch codes and systems.

This is the amalgamation of the Air Force Collaboratory, Navy, Cyber Security, the Bureau of Central Intelligence, and the CIA - and a small part of what would go down in a WW3 setting.

When AI can be integrated into the human brain this whole operation doesn't have to be the product an amalgamation of advanced military branches, but can be run by one Cyber Specialist (should pull in yearly earnings of about a billion $) who has control over several bodies and minds through his Super Program designed on a 20 exaflop nanoserver platform with femto-scale quantum-entanglement integrated circuitry.

Re: Re: Here's the importance of Cyber Warfare

Originally posted by Dolos
When AI can be integrated into the human brain this whole operation doesn't have to be the product an amalgamation of advanced military branches, but can be run by one Cyber Specialist (should pull in yearly earnings of about a billion $) who has control over several bodies and minds through his Super Program designed on a 20 exaflop nanoserver platform with femto-scale quantum-entanglement integrated circuitry.

/smh

why does this person need access to America's nuclear arsenal?

Originally posted by dadudemon
I hope that clears up any notion you had that "hacking nukes" was feasible: it's just Hollywood Bullsh*t. An infinite amount of 0-Days will never get you into a network that is physically isolated from the rest of the world.

IIRC America's nuclear control is built into a mountain, itself capable of withstanding direct nuclear explosions.

That being said, in the 70s (I think) they found out that for years one of the codes to launch the nukes was still the factory default of 00000 or something.

Or you could just drop a gray goo caterpillar that completely corrupts any of those archaic systems. But that's next century's tech.

so, when you say "cyber warfare", what you really mean is "science fiction technology used against modern military targets"?

Originally posted by Oliver North
so, when you say "cyber warfare", what you really mean is "science fiction technology used against modern military targets"?
More like, "next decades tech against military targets a decade from now."

Oh, that's right. Little bit of a pick up. Almost violates thermodynamics, but it doesn't need to do these things actually not when you have programs and ICT advanced enough.

Originally posted by Dolos
Solution to hacking isolated networks = EMP projectile launched from hypersonic stealth craft and detonated near the facility, followed by an altered reboot that gives you access.

Solution operating manual switches required = Recon seal team with access to tech that can jam signals allowing for alteration of the aforementioned reboot of nuclear systems. They'd be there for weeks in secret during the recalibration of the nuclear launch codes and systems.

This is the amalgamation of the Air Force Collaboratory, Navy, Cyber Security, the Bureau of Central Intelligence, and the CIA - and a small part of what would go down in a WW3 setting.

When AI can be integrated into the human brain this whole operation doesn't have to be the product an amalgamation of advanced military branches, but can be run by one Cyber Specialist (should pull in yearly earnings of about a billion $) who has control over several bodies and minds through his Super Program designed on a 20 exaflop nanoserver platform with femto-scale quantum-entanglement integrated circuitry.

Yeah, its amazing what future technology will be like when you're making it up off the top of your head.

Originally posted by Dolos
Or you could just drop a gray goo caterpillar that completely corrupts any of those archaic systems. But that's next century's tech.

In the future where gray goo caterpillars exist, there will also exist anti gray goo caterpillars, or AGGCs for short 🙂

Originally posted by Robtard
In the future where gray goo caterpillars exist, there will also exist anti gray goo caterpillars, or AGGCs for short 🙂
No just nanite automatons (IE caterpillar) wired to a different system that attempt to assimilate enemy nanite automatons. Same principle.
Originally posted by Symmetric Chaos
Yeah, its amazing what future technology will be like when you're making it up off the top of your head.
Technology will find a way do horrific things. Cyber security is increasingly integral <- that's what I'm trying to instill.

*We're innovative beings and we will create war technologies that will be capable of shocking the world.

STFU guys, he hacked the interwebz, now the missiles are his. Also your baby monitor at home, cause magic.

Originally posted by Dolos
Solution to hacking isolated networks = EMP projectile launched from hypersonic stealth craft and detonated near the facility, followed by an altered reboot that gives you access.

Solution to EMP: Faraday cages...which are present even on ICBMs (yeah...they are shielded from powerful EMP bursts that come from special nuke explosions, even mid-flight).

Originally posted by Dolos
Solution operating manual switches required = Recon seal team with access to tech that can jam signals allowing for alteration of the aforementioned reboot of nuclear systems. They'd be there for weeks in secret during the recalibration of the nuclear launch codes and systems.

A "recon seal team"? lol, the US is going to fight itself, eh? On top of that, how is a seal team supposed to get past all the physical security measures which are designed specially to prevent people from getting passed them including recon seal teams?

Originally posted by dadudemon
Solution to EMP: Faraday cages...which are present even on ICBMs (yeah...they are shielded from powerful EMP bursts that come from special nuke explosions, even mid-flight).

I was unaware of "Faraday cages". This is interesting.

A "recon seal team"? lol, the US is going to fight itself, eh? On top of that, how is a seal team supposed to get past all the physical security measures which are designed specially to prevent people from getting passed them including recon seal teams?

Nano-scopic cameras and sensors covering every inch of the body, projecting an image of what's behind said recon operative. They cannot be seen. As for getting past sensors, in said scenario (without faraday cages in mind), they're down along with everything else.

Solution to Faraday cages = carbon-buckeyball nano-drills released from hand-thrown discs (by recon ops) or penny-sized devices put on surface of cage (depending on size) will degradate it without it being visibly known (swiss cheese: microscopic holes covering most of surface area), making the switches and networks vulnerable to high atmosphere nuclear EMP bursts of projectiles launched from low-orbit hypersonic stealth crafts with necessary reaction speed and precision (again from faster, more precise automated targeting systems).

Originally posted by Dolos
Nano-scopic cameras and sensors covering every inch of the body, projecting an image of what's behind said recon operative. They cannot be seen.

Except for those pesky sonar and infrared cameras.

Originally posted by Dolos
Solution to Faraday cages = nano-drills will degradate it without it being visibly known, making the switches and networks vulnerable to high atmosphere nuclear EMP bursts of projectiles launched from low-orbit hypersonic stealth jets with necessary targeting speed and precision (again from better integrated circuit technologies).

Except the "field integrity" sensors that would detect the drilling, even at the microscopic level.

Nothing's insoluble so we could do this all day.

Will you accuse me of being less than pragmatic with the solutions I create? So far so good before your reply, or no?

inimalist, you're an excellent empirical-sceptic but your field is psychology so quit trying to hate. You too, Bardock, I don't care what you've studied, one hater at a time. I'm only one man, for now. Talking to you as well, SC.

Originally posted by dadudemon
Solution to EMP: Faraday cages...which are present even on ICBMs (yeah...they are shielded from powerful EMP bursts that come from special nuke explosions, even mid-flight).

I'll just point out again that American nuclear command is built into a mountain, or, something that is not known to carry electromagnetic signals very well.