Following my own advice, I found earlier "software sabotage" citations: ACM-Risks Digest: http://catless.ncl.ac.uk/Risks/5.40.html#subj2 Corrected Message: ----------------- Date: Mon, 1 Oct 2001 05:37:07 -0400 Subject: [VIC-Net] Semper Paratis & CyberAttack Trends? I [used] term "software sabotage" for a 1988 MIS Training Institute Conf! FYI - Scan appended "BullsEye2" update on where it's gone since then . . . Cheers from CONUS "North Coast!" Bob (RJ) Burkhart : LCDR, USNR-Ret. CyberCrime Fighter & Facilitator ACCTTS-LLC website @ http://home.mn.rr.com/accttsllc/ **VIRTUAL InfraG(u)ard Collaborative** Networking . . . aka VIC-Net "THINK globally & ACT inter-regionally" http://www.iwar.org.uk/infragard/ Moderator: http://groups.yahoo.com/group/ciberpac-net Navigator: http://groups.yahoo.com/group/MN-BCPA _____________________________________________________ Military role for software sabotage cited in big CHICAGO TRIBUNE story Jon Jacky <jon@private> Mon, 28 Sep 87 11:16:21 PDT The following story got a full page, with artwork, inside the front section of the Sunday, Sept. 20 1987 SEATTLE TIMES: A NEW BATTLEFIELD: SOFTWARE WARFARE - RISING FORM OF COMPUTER SABOTAGE MAY BE NEXT GREAT MILITARY EQUALIZER by Scott A. Boorman and Paul R. Levitt - Chicago Tribune If members of the John Walker spy ring could betray their positions of TRUST to the Soviets for nearly 20 years, what could US adversaries do to sabotage- quietly, from the inside - the complex computer programs on which US weapons vitally depend? ... Software warfare - attacking the software that controls or operates such weapons - may be the cheapest, simplest, and most effective way to cripple US defenses. Such sabotage is coming of age as a new type of systematic warfare, which can be waged far removed from space and time from any battlefield to influence not only combat outcomes but also peacetime balances of power ... Given a host of recent US spy scandals, it is easy to envision a computer programmer offering, if the price is right, to add or modify critical lines of software to benefit a hostile country... Given its scale and mission ... it is SDI that merits special scrutiny in light of software concerns. ... The effort to develop & coordinate all the necessary SDI software seems destined to involve several thousand software professionals working alone, working over many years. ... The extreme complexity of SDI software also suggests significant bugs may be nearly impossible to trace - even after some future software saboteur is caught... Software warfare's relative cheapness .. may make it the next great military equalizer. ... (It) certainly lies well within the grasp of any number of agressive lesser military poweers with the means to buy insiders to plant crippling bugs .. It is vital to bring software warfare into focus in broad arenas of US national security planning. (End of excerpts) The story cited an article by the late Rear Adm. Henry Eccles in the June 1986 Naval War College Review. It did not cite other sources who have mentioned this idea, including David Parnas and the French authors of a thriller titled SOFTWAR that appeared in translation in the USA a few years ago. [Chuck de Caro, "Operationalizing SOFTWAR" in Cyberwar 2.0 on pp. 199+] The article also claims "American teenagers using home computers have developed the capability to alter orbits of commercial satellites, as demonstrated by a recent incident in New Jersey." Surely this must be an exaggeration? - Jon Jacky http://www.google.com/search?hl=en&q=SOFTWAR+sabotage http://www.cs.georgetown.edu/~denning/cosc511/spring99/schedule.html http://www.google.com/search?hl=en&q=%22Chuck+de+Caro%22+Cyberwar+2.0 -------------------------------------------------------------------- mail2web - Check your email from the web at http://mail2web.com/ .
This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:26:49 PDT