Re: [Cryptography] Iran and murder

2013-10-10 Thread John Kelsey
The problem with offensive cyberwarfare is that, given the imbalance between 
attackers and defenders and the expanding use of computer controls in all sorts 
of systems, a cyber war between two advanced countries will not decide anything 
militarily, but will leave both combattants much poorer than they were 
previously, cause some death and a lot of hardship and bitterness, and leave 
the actual hot war to be fought. 

Imagine a conflict that starts with both countries wrecking a lot of each 
others' infrastructure--causing refineries to burn, factories to wreck 
expensive equipment, nuclear plants to melt down, etc.  A week later, that 
phase of the war is over.  Both countries are, at that point, probalby 10-20% 
poorer than they were a week earlier.  Both countries have lots of really 
bitter people out for blood, because someone they care about was killed or 
their job's gone and their house burned down or whatever.  But probably there's 
been little actual degradation of their standard war-fighting ability.  Their 
civilian aviation system may be shut down, some planes may even have been 
crashed, but their bombers and fighters and missiles are mostly still working.  
Fuel and spare parts may be hard to come by, but the military will certainly 
get first pick.  My guess is that what comes next is that the two countries 
have a standard hot war, but with the pleasant addition of a great depression 
 sized economic collapse for both right in the middle of it.

--John
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


Re: [Cryptography] Iran and murder

2013-10-10 Thread Lodewijk andré de la porte
2013/10/9 Phillip Hallam-Baker hal...@gmail.com

 I see cyber-sabotage as being similar to use of chemical or biological
 weapons: It is going to be banned because the military consequences fall
 far short of being decisive, are unpredictable and the barriers to entry
 are low.


I doubt that's anywhere near how they'll be treated. Bio en Chem are banned
for their extreme relative effectiveness and far greater cruelty than most
weapons have. Bleeding out is apparently considered quite human, compared
to chocking on foamed up parts of your own lungs. Cyberwarfare will likely
be effectively counteracted by better security. The more I think the less I
understand fall far short of being decisive. If cyber is out you switch
to old-school tactics. If chemical or biological happens it's either death
for hundreds or thousands or nothing happens.

Of course the bigger armies will want to keep it away from the
terrorists, it'd level the playing field quite a bit. A 200 losses, 2000
kills battle could turn into 1200 losses, 1700 kills quite fast. But that's
not what I'd call a ban.
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] Iran and murder

2013-10-10 Thread Lodewijk andré de la porte
2013/10/10 John Kelsey crypto@gmail.com

 The problem with offensive cyberwarfare is that, given the imbalance
 between attackers and defenders and the expanding use of computer controls
 in all sorts of systems, a cyber war between two advanced countries will
 not decide anything militarily, but will leave both combattants much poorer
 than they were previously, cause some death and a lot of hardship and
 bitterness, and leave the actual hot war to be fought.


I think you'd only employ most the offensive means in harmony with the
start of the hot war. That makes a lot more sense than annoying your
opponent.


 Imagine a conflict that starts with both countries wrecking a lot of each
 others' infrastructure--causing refineries to burn, factories to wreck
 expensive equipment, nuclear plants to melt down, etc.  A week later, that
 phase of the war is over.  Both countries are, at that point, probalby
 10-20% poorer than they were a week earlier.


I think this would cause more than 20% damage (esp. the nuclear reactor!).
But I can imagine a slow buildup of disabled things happening.


 Both countries have lots of really bitter people out for blood, because
 someone they care about was killed or their job's gone and their house
 burned down or whatever.  But probably there's been little actual
 degradation of their standard war-fighting ability.  Their civilian
 aviation system may be shut down, some planes may even have been crashed,
 but their bombers and fighters and missiles are mostly still working.  Fuel
 and spare parts may be hard to come by, but the military will certainly get
 first pick.  My guess is that what comes next is that the two countries
 have a standard hot war, but with the pleasant addition of a great
 depression sized economic collapse for both right in the middle of it.


This would be a mayor plus in the eyes of the countries' leaders.
Motivating people for war is the hardest thing about it. I do think the
military relies heavily on electronic tools for coordination. And I think
they have plenty of parts stockpiled for a proper blitzkrieg.

Most the things you mentioned can be achieved with infiltration and covert
operations, which are far more traditional. And far harder to do at great
scale. But they are not done until there is already a significant blood
thirst.

I'm not sure what'd happen, simply put. But I think it'll become just
another aspect of warfare. It is already another aspect of the cover
operations, and we haven't lived a high-tech vs high-tech war. And if it
does happen, the chance we live to talk about it is less than I'd like.

You pose an interesting notion about the excessiveness of causing a great
depression before the first bullets fly. I counter that with the effects of
conventional warfare being more excessively destructive.
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] Iran and murder

2013-10-09 Thread Phillip Hallam-Baker
On Wed, Oct 9, 2013 at 12:44 AM, Tim Newsham tim.news...@gmail.com wrote:

  We are more vulnerable to widespread acceptance of these bad principles
 than
  almost anyone, ultimately,  But doing all these things has won larger
 budgets
  and temporary successes for specific people and agencies today, whereas
  the costs of all this will land on us all in the future.

 The same could be (and has been) said about offensive cyber warfare.


I said the same thing in the launch issue of cyber-defense. Unfortunately
the editor took it into his head to conflate inventing the HTTP referer
field etc. with rather more and so I can't point people at the article as
they refuse to correct it.


I see cyber-sabotage as being similar to use of chemical or biological
weapons: It is going to be banned because the military consequences fall
far short of being decisive, are unpredictable and the barriers to entry
are low.

STUXNET has been relaunched with different payloads countless times. So we
are throwing stones the other side can throw back with greater force.


We have a big problem in crypto because we cannot now be sure that the help
received from the US government in the past has been well intentioned or
not. And so a great deal of time is being wasted right now (though we will
waste orders of magnitude more of their time).

At the moment we have a bunch of generals and contractors telling us that
we must spend billions on the ability to attack China's power system in
case they attack ours. If we accept that project then we can't share
technology that might help them defend their power system which cripples
our ability to defend our own.

So a purely hypothetical attack promoted for the personal enrichment of a
few makes us less secure, not safer. And the power systems are open to
attack by sufficiently motivated individuals.


The sophistication of STUXNET lay in its ability to discriminate the
intended target from others. The opponents we face simply don't care about
collateral damage. So  I am not impressed by people boasting about the
ability of some country (not an ally of my country BTW) to perform targeted
murder overlooks the fact that they can and likely will retaliate with
indiscriminate murder in return.

I bet people are less fond of drones when they start to realize other
countries have them as well.


Lets just stick to defense and make the NATO civilian infrastructure secure
against cyber attack regardless of what making that technology public might
do for what some people insist we should consider enemies.

-- 
Website: http://hallambaker.com/
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] Iran and murder

2013-10-09 Thread James A. Donald

On 2013-10-08 02:03, John Kelsey wrote:

Alongside Phillip's comments, I'll just point out that assassination of key 
people is a tactic that the US and Israel probably don't have any particular 
advantages in.  It isn't in our interests to encourage a worldwide tacit 
acceptance of that stuff.


Israel is famous for its competence in that area.


And if the US is famously incompetent, that is probably lack of will,
rather than lack of ability.  Drones give the US technological supremacy in
the selective removal of key people


___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


Re: [Cryptography] Iran and murder

2013-10-09 Thread Tim Newsham
 We are more vulnerable to widespread acceptance of these bad principles than
 almost anyone, ultimately,  But doing all these things has won larger budgets
 and temporary successes for specific people and agencies today, whereas
 the costs of all this will land on us all in the future.

The same could be (and has been) said about offensive cyber warfare.

 --John

-- 
Tim Newsham | www.thenewsh.com/~newsham | @newshtwit | thenewsh.blogspot.com
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography