May 2010, a little more than a year after President Obama took office and 
only weeks before Stuxnet became public, a new organization to exercise 
American rule over the increasingly militarized Internet became operational: 
the US Cyber Command. Keith Alexander, newly promoted to four-star general, 
was put in charge of it. The forces under his command were now truly 
formidable-his untold thousands of NSA spies, as well as 14,000 incoming 
Cyber Command personnel, including Navy, Army, and Air Force troops. Helping 
Alexander organize and dominate this new arena would be his fellow plebes 
from West Point's class of 1974: David Petraeus, the CIA director; and 
Martin Dempsey, chair of the Joint Chiefs of Staff.

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/3/

The reason for posting this is because it tweaks my geekhood, which is part 
of the sci-fi, computer, math, and science sphere. So, check this out:

``According to Defense News' C4ISR Journal and Bloomberg Businessweek, 
Endgame also offers its intelligence clients-agencies like Cyber Command, 
the NSA, the CIA, and British intelligence-a unique map showing them exactly 
where their targets are located. Dubbed Bonesaw, the map displays the 
geolocation and digital address of basically every device connected to the 
Internet around the world, providing what's called network situational 
awareness. The client locates a region on the password-protected web-based 
map, then picks a country and city- say, Beijing, China. Next the client 
types in the name of the target organization, such as the Ministry of Public 
Security's No. 3 Research Institute, which is responsible for computer 
security-or simply enters its address, 6 Zhengyi Road. The map will then 
display what software is running on the computers inside the facility, what 
types of malware some may contain, and a menu of custom-designed exploits 
that can be used to secretly gain entry. It can also pinpoint those devices 
infected with malware, such as the Conficker worm, as well as networks 
turned into botnets and zombies- the equivalent of a back door left open.''

CG 

_______________________________________________
pen-l mailing list
[email protected]
https://lists.csuchico.edu/mailman/listinfo/pen-l

Reply via email to