[VIC-Net] Cyberwar 2.0 Cites on "Software Sabotage" BullsEye2 Update

From: EL_burkhart@private
Date: Mon Oct 01 2001 - 04:06:55 PDT

  • Next message: George Heuston: "FW: NIPC Daily Report for 01 October 2001"

    Following my own advice, I found earlier "software sabotage" citations:
    
        ACM-Risks Digest:  http://catless.ncl.ac.uk/Risks/5.40.html#subj2
    
    Corrected Message:
    -----------------
    Date: Mon, 1 Oct 2001 05:37:07 -0400
    Subject: [VIC-Net]  Semper Paratis & CyberAttack Trends?
    
    I [used] term "software sabotage" for a 1988 MIS Training Institute Conf!
    
    FYI - Scan appended "BullsEye2" update on where it's gone since then . . .   
    
    Cheers from CONUS "North Coast!" 
    Bob (RJ) Burkhart : LCDR, USNR-Ret.
    	CyberCrime Fighter & Facilitator
    
    ACCTTS-LLC website @ http://home.mn.rr.com/accttsllc/ 
    
    **VIRTUAL InfraG(u)ard Collaborative** Networking . . .  
    aka VIC-Net "THINK globally & ACT inter-regionally"
     	http://www.iwar.org.uk/infragard/
    
    Moderator:	http://groups.yahoo.com/group/ciberpac-net
    Navigator:	http://groups.yahoo.com/group/MN-BCPA
    _____________________________________________________
    
    Military role for software sabotage cited in big CHICAGO TRIBUNE story
    Jon Jacky <jon@private>
    
    Mon, 28 Sep 87 11:16:21 PDT 
    The following story got a full page, with artwork, 
    inside the front section of the Sunday, Sept. 20 1987 SEATTLE TIMES:
    
      A NEW BATTLEFIELD: SOFTWARE WARFARE - RISING FORM OF COMPUTER SABOTAGE MAY
      BE NEXT GREAT MILITARY EQUALIZER
    
      by Scott A. Boorman and Paul R. Levitt - Chicago Tribune
    
      If members of the John Walker spy ring could betray their positions of TRUST to the Soviets for nearly 20 years, what could US adversaries do to sabotage- quietly, from the inside - the complex computer programs on which US weapons vitally depend? ...
    
      Software warfare - attacking the software that controls or operates such
      weapons - may be the cheapest, simplest, and most effective way to cripple
      US defenses.  Such sabotage is coming of age as a new type of systematic
      warfare, which can be waged far removed from space and time from any
      battlefield to influence not only combat outcomes but also peacetime
      balances of power ...
    
      Given a host of recent US spy scandals, it is easy to envision a computer
      programmer offering, if the price is right, to add or modify critical lines
      of software to benefit a hostile country...
    
      Given its scale and mission ... it is SDI that merits special scrutiny in
      light of software concerns. ... The effort to develop & coordinate all the
      necessary SDI software seems destined to involve several thousand software
      professionals working alone, working over many years. ... The extreme
      complexity of SDI software also suggests significant bugs may be nearly 
      impossible to trace - even after some future software saboteur is caught...
    
      Software warfare's relative cheapness .. may make it the next great military equalizer. ... (It) certainly lies well within the grasp of any number of agressive lesser military poweers with the means to buy insiders to plant crippling bugs ..
    
      It is vital to bring software warfare into focus in broad arenas of US
      national security planning.
    
      (End of excerpts)
    
    The story cited an article by the late Rear Adm. Henry Eccles in the June 1986 Naval War College Review.  It did not cite other sources who have mentioned this idea, including David Parnas and the French authors of a thriller titled SOFTWAR that appeared in translation in the USA a few years ago. [Chuck de Caro, "Operationalizing SOFTWAR" in Cyberwar 2.0 on pp. 199+] 
    
    The article also claims "American teenagers using home computers have
    developed the capability to alter orbits of commercial satellites, as
    demonstrated by a recent incident in New Jersey."  
    
    Surely this must be an exaggeration?
                                            - Jon Jacky
    
      http://www.google.com/search?hl=en&q=SOFTWAR+sabotage
    
      http://www.cs.georgetown.edu/~denning/cosc511/spring99/schedule.html
    
      http://www.google.com/search?hl=en&q=%22Chuck+de+Caro%22+Cyberwar+2.0
      
    
    --------------------------------------------------------------------
    mail2web - Check your email from the web at
    http://mail2web.com/ .
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:26:49 PDT