More Companies Looking To Cash In On So-Called 'Cyber War'; Press Buys Questionable Claims

from the fact-checks? dept

We’ve been discussing the manufactured buzz around the concept of a “cyberwar,” despite the lack of any real evidence of anything beyond some typical espionage efforts with a bit of vandalism thrown in for color. However, for the companies building up the buzz, it’s proving to be quite profitable, and it appears others are rushing to get in on the gravy train — and they’re using the unquestioning press to push the claim along. Take, for example, this Reuters article, that is all about how British aerospace/defense contractor giant BAE is now trying to cash in on the US government’s new obsession with “cyberwar.” The article opens in a cinematic fashion:

Threats to sensitive computer networks lurk everywhere and with a few mouse clicks, organized criminals and hackers could shut down vital networks that run the U.S. government, industry and military.

Source for that? None. Details? None. Evidence? None. Explanation for why vital networks that run the U.S. government and military are connected to the open internet? None. Explanation for why if all it takes is a few mouse clicks, no one has actually taken down these networks yet? None. In fact, that opening is never revisited or explained. Instead, it’s taken for granted along with what’s effectively a press release for BAE’s new “cyber center” in (of course) Washington DC. If this keeps up, perhaps Techdirt will need to open a “cyberwar” division just to cash in on this hype.

Filed Under: , ,
Companies: bae

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “More Companies Looking To Cash In On So-Called 'Cyber War'; Press Buys Questionable Claims”

Subscribe: RSS Leave a comment
24 Comments
Dark Helmet (profile) says:

You're getting warmer, Mike...

“However, for the companies building up the buzz, it’s proving to be quite profitable…”

What do we always say around here? That just throwing the word cyber in front of something doesn’t change anything right? So, to that end, a couple of things to consider:

1. Who owns these companies? And I don’t mean publically, I mean who owns them by sitting on their boards, or which banks hold their debt and bank accounts? Who loans them money? Ultimately, who is going to profit off of this?

2. Is there any reason to believe that this type of thing only happens in this elusive cyberwar? Why are we willing to believe that a cyberwar has been dreamed up and/or deliberately constructed by those that want to profit from it, but not physical warfare? Who funded and helped to create Hitler? Who funded and helped to create communist Russia? Who profited from those wars? Since the war on terror began, have the richest in the world gotten more rich, or poorer? Has the disparity in wealth between the rich and the poor increased or decreased?

I believe in the answers to those questions you will find the impetus for true anger and revolution….

keven sutton says:

Re: You're getting warmer, Mike...

Mostly just for your entertainment value dark:

Watch what Happens when I add cyber to your sentences.

Who owns these Cyber-companies? And I don’t mean publicly, I mean who owns them by sitting on their Cyber-boards, or which Cyber-banks hold their Cyber-debt and Cyber-bank accounts? Who loans them Cyber-money? Ultimately, who is going to profit off of this?

See? now the sentence sounds edgy and cool. totally different.

Fletcher says:

Cybersecurity Blanket

There’s a push to expand the cyberwar efforts beyond military infrastructure.

This article dated May 10th describes passing of the Executive Cyberspace Authorities Act of 2010, which allows witholding of federal funds if the cyberspace director thinks a given agency isn’t spending enough on cybersecurity:

http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1512153,00.html

And this article dated May 27th describes the Defense Deputy Secretary’s desire to allow Defense Department network protection systems to also cover private sector finance and utility operations:

http://www.govinfosecurity.com/articles.php?art_id=2581

Jeff (profile) says:

Fear

I think FDR said it best, “The only thing we have to fear is fear itself.”

They create the fear that the nukes will start flying or the power grid will crash because the US govt has the servers open to the web because of lax security, and get the public to fear it, then they get their representatives involved and it just spirals from there! There are too many “sheeple” out there that believe anything that is on the news, because you know the news is always truthful and honest, right?!?
So they use the press to feed the fear, thus getting the govt to throw more money to them to fix the thing causing the fear. Since when did the press have to actually have hard facts to publish a story.

/sarcon
I vote yes for the Techdirt “cycberwar” division. You know you have got to keep us informed of the terrorists and anti-US govts that are taking over the pcs of all the Americans and are about to launch a full scale invasion and war on us!!!! To ARMS!!!!!
/sarcoff

Dark Helmet (profile) says:

Re: Fear

“I think FDR said it best, “The only thing we have to fear is fear itself.””

Clash this incredbly insightful statement with the Governor of Arizona’s recent request to the federal government for both National Guard helicopters and Predator drones to help enforce the Arizona border.

What a sight that would be, to be an Arizona citizen walking down the street and see an armed drone flying over your head followed by a couple of Blackhawks….

NAMELESS.ONE says:

if your stupid and in govt and you know it

raise your hand

cause if your stupid in govt and you really want to show it
RAISE YOUR HAND

yea put sensitive crap accessable to the net thats a good idea
maybe instead build yourselves a closed network OH WAIT
YOU HAVE ONE

so the fuss?
its aimed at stopping freedom of speech and curtailing the hacker movement thats growing world wide in response to the USA destroying peoples civil rights with IP laws world wide

PLAIN simple and to the point.
YOU KNOW I LOVE CAPS TOO

Darryl says:

"What attacks", oh my, dont get out much ?

“Threats to sensitive computer networks lurk everywhere and with a few mouse clicks, organized criminals and hackers could shut down vital networks that run the U.S. government, industry and military. “

Um… Where does the word “internet” appear in that statement, is says “computer networks”, and vital networks, that means SCADA systems, satellite control systems, MILITARY and Government networks, business networks and so on..

All “vital computer systems”, you might work out one day that there is a whole world beyond just the “innernet”.

And again, you are showning a complete lack of knowledge, and really irresponsibility to play down what is a clear, and existing and continuous threat.

As I said before, it’s not just about public web pages being defaced, it’s about stealing information, disrupting operations, and causing problems.

If the US CIA, sell a SCADA (supervisory control and data acquisition) control system, and software to Russia, that was booby trapped to fair at a certain time in the future, and it does fail and it causes a massive gas pipeline explosion and kills lots of people, would you call that an attacking using computers and computer networks.

A SCADA system is a computer network, and there are more SCADA system processors than there are humans on earth, they control just about every aspect of you’re life, they control you’re car, you’re trains, you’re electricity, water, sewage, gas, fuel, air-conditional, freakin everything.

And you dont think you’re water supply, electricity, car, train, plain, gas supply are not critical infrastructures.

BTW: there are many many examples of computer networks that are vital being broken into or compromised by hackers and cybercriminals.

There is a whole world outside of the “net”.

http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/

I worked with this person, and help catch him, but not before he did a great amount of damage.

http://www.theregister.co.uk/2000/04/27/russia_welcomes_hack_attacks/

http://www.theregister.co.uk/2004/08/16/power_grid_cybersecurity/

http://www.theregister.co.uk/2008/09/25/abb_critical_bug/

“Washington (dbTechno) – A British man, 42-year old Gary McKinnon, lost an appeal this week, and will now likely be extradited to the United States. He is the hacker who managed to hack his way into the Pentagon and NASA.”

I could probably easily sit here for the next 24 hours and constantly post examples (that you claim do not exist, for want of looking) of cyberwar type attacks, and their effects on the industries it affects.

This say “problem, what problem” is one of the poorest examples of “journalism” ive ever seen.

Anonymous Coward says:

Re: "What attacks", oh my, dont get out much ?

Um… Where does the word “internet” appear in that statement, is says “computer networks”, and vital networks…

OK then, suppose you tell us exactly which “vital” military networks are subject to outsiders shutting them down “with a few mouse clicks”. Go on, we’re waiting…

A SCADA system is a computer network, and there are more SCADA system processors than there are humans on earth, they control just about every aspect of you’re life, they control you’re car, you’re trains, you’re electricity, water, sewage, gas, fuel, air-conditional, freakin everything.

You left out calculators, microwave ovens, refrigerators and wristwatches, to name a few more. That still doesn’t amount to “warfare”. You exaggerate in the same way the MPAA does about copyright infringement putting corn farmers out of business.

This say “problem, what problem” is one of the poorest examples of “journalism” ive ever seen.

So who’s claiming “journalism”? You don’t even seem to know what site you’re posting on.

chris (profile) says:

Re: "What attacks", oh my, dont get out much ?

If the US CIA, sell a SCADA (supervisory control and data acquisition) control system, and software to Russia, that was booby trapped to fair at a certain time in the future, and it does fail and it causes a massive gas pipeline explosion and kills lots of people, would you call that an attacking using computers and computer networks.

*yawn*

that’s just spies doing spy stuff that happens to involve computers, i.e. “some typical espionage efforts” as described in the article.

this hype makes “cyber warfare” sound like some scary new thing that has spawned from the net itself. it’s not.

businessmen use computers and networks to do business, it’s only natural that spies and criminals would start using them too. therefore, the intelligence and law enforcement communities should learn to use computers and networks as well to catch the bad guys they are supposed to protect us from. nothing more to see here, move along.

there are two varieties of computer crimes: crimes where a computer or network is the target, and crimes where a computer or network is an instrument in the commission of a crime.

your SCADA scenario is the latter, not the former. it’s still sabotage, it’s just sabotaging a computer instead of some other part of the gas line system. big freaking deal.

Anonymous Coward says:

it’s the hallmark of immature security professionals. The constant barrage of fear surrounding the “smart grid” is the same. Companies who can’t get business from their skill and knowledge trump up some issue as a serious problem then claim to have all the expertise to fix said problem. The only correct answer is to simply refuse to work with these types. Any security professional who resorts to FUD to sell their services is an incompetent security person. I work for a fairly large retailer and we refuse to work with companies like IOActive and Accuvant because their sales people are constantly trying to scare us into buying their services. It has been our experience that smaller firms often have a more realistic approach to security.

Darryl says:

'Typical' espionage and vandalism !

“real evidence of anything beyond some typical espionage efforts with a bit of vandalism thrown in for color.”

you can almost see you’re thought process working here, in the use of the word “typical”, all the options to play down espionage and vandalism,

Hmm, “innocent espionage”
or “harmless espionage and vandalism”
(ok, ill go with typical).

For a start espionage and vandalism are two completely seperate things, typical vandalism might be something low level like tagging a wall with paint, but there is little in the way of typical espionage.

It’s like saying “typical” theft, or typical murder, it does not make it any better if it’s “typical” or not, it’s still a crime.

So if I was pissed off with the US (and ofcourse no one is ever pissed off with the US). I might direct some of my agents to go to Hoover dam, with radio’s and radio modems, and hacked the DNP network protocol of the Dam’s SCADA network, find the connect control channel for the flood gate motors, and the overflow alarm, set up my two-way radio in the middle of the 2 network nodes (man in the middle attack), and using more RF power than the base state, command the Dam’s flood gate PLC’s to drive the motors fully open, and keep them open until they burn out.

Thus releasing billions of tons of water and washing away LasVagas.

It’s nowhere near the internet, but it’s cyber terrorism, or cyber war just as effective as flying 747’s into a building. Something else the US does not like having done to it, that it did not expect, until it was too late.

So you think it’s a bad idea to have people thinking about possible vectors for attacks on computers systems, I find that a very very unusualy position to take, considering the world we actually live in, (well most of us).

Anonymous Coward says:

Re: 'Typical' espionage and vandalism !

I might direct some of my agents to go to Hoover dam, with radio’s and radio modems, and hacked the DNP network protocol of the Dam’s SCADA network, find the connect control channel for the flood gate motors, and the overflow alarm, set up my two-way radio in the middle of the 2 network nodes (man in the middle attack), and using more RF power than the base state, command the Dam’s flood gate PLC’s to drive the motors fully open, and keep them open until they burn out.

I might could do even better than that. I might could use psychic powers to take over the minds of the people who run the dam and make *them* open the floodgates! And then I might take over the mind of the president and start WWIII! So you see, psychics are the biggest threat in the world!

Darryl says:

However you do it, is has to be done.

” I might could use psychic powers to take over the minds of the people who run the dam and make *them* open the floodgates! “

Go for it, but the number of successful ‘psychic’ attacks Vs the Number of real and successful Scada computer system attacks means if you actually want to get the job done, It would be wise to do something that is KNOWN to work.

Sure, you can try to get to outer space, by building a HUGE ladder, but you’re chances of success are not high.

All I was saying, is that these attacks are allready common, they will increase, they often have nothing to do with military systems, or the internet and they have the potential of doing huge damage.

And you would be stupid to ignore the possible threat, or write it off as “typical”.

It’s not even like it’s anything new, this is an old and common problem, and like everything in the IT world it evolves with systems. And the countermeasures as well have to evolve, and it’s right for the government to ensure a certain level of security and confidence that all the various services and human functions and commerce work on a day to day basis.

And if they did not take the proper precautions then they would be liable for damages for not doing so.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...