{"id":4935,"date":"2016-09-02T16:09:29","date_gmt":"2016-09-02T21:09:29","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=4935"},"modified":"2016-09-02T16:09:29","modified_gmt":"2016-09-02T21:09:29","slug":"making-noise","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2016\/09\/02\/making-noise\/","title":{"rendered":"Making Noise"},"content":{"rendered":"<p><em><strong>Fedscoop<\/strong><\/em> takes note of an <a href=\"http:\/\/fedscoop.com\/us-cyber-command-offensive-cybersecurity-nsa-august-2016\" target=\"_blank\">announcement<\/a>:<\/p>\n<blockquote><p>Shawn Turskey [Executive Director for\u00a0U.S.\u00a0Cyber Command] told a small\u00a0audience of predominantly security software vendors and government officials the command unit is looking for tools that can be definitively traced back to the United States military, diverging\u00a0from the ultra-stealth exploits often used at bureaus like the National Security Agency.<\/p>\n<p>\u201cIn the intelligence community\u00a0you never want to be caught, you want be low and slow, you never really want to be attributed. There\u2019s a different paradigm from where you are at in the intelligence community,&#8221; said Turskey,\u00a0who leads the Department of Defense\u2019s capability and tool development project within Cyber Command.\u00a0\u00a0&#8220;But there\u2019s another space over here, where maybe you definitely want to be louder, where attribution is important to you and you actually want the adversary to know.\u201d<\/p>\n<p>The development of \u201cloud\u201d offensive cyber tools, able to possibly deter future intrusions, represent a \u201cdifferent paradigm shift\u201d from what the agency has used to in the past, Turskey said.<\/p><\/blockquote>\n<p>Dr. Herb Lin asks some questions, via <em><strong>Lawfare<\/strong><\/em>, with this amongst them:<\/p>\n<blockquote><p>4. Is enabling a national attribution marker required by the laws of war?\u00a0 Fighter planes and cruise missiles carry a U.S. insignia; soldiers wear U.S. uniforms.\u00a0 But bullets do not.\u00a0 Is a cyber weapon more like a platform or soldier, or more like a bullet?<\/p><\/blockquote>\n<p>These cyberwarriors<sup>1<\/sup> of which they speak are soldiers, but the end result, while non-kinetic, non-explosive, is more like a bullet. Which means that branding the final attack instrument is a tactical question, not a legal question, at least in my pragmatic view. I suppose someone can make a law requiring attacks to be branded &#8211; but who will pay attention? Laws&#8217; efficacy, particularly in war, lies to some extent in its probability of effective enforcement, and also in your fear that if you use some illegal tactic, so will your enemy. So far, I&#8217;d say the probability of enforcing such a law is low, and the fear of attack from an anonymous source, vs a known source, isn&#8217;t all that significant.<\/p>\n<hr \/>\n<p><sup>1<\/sup>&#8220;Cyberwarriors&#8221; made me tired even before I read it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fedscoop takes note of an announcement: Shawn Turskey [Executive Director for\u00a0U.S.\u00a0Cyber Command] told a small\u00a0audience of predominantly security software vendors and government officials the command unit is looking for tools that can be definitively traced back to the United States military, diverging\u00a0from the ultra-stealth exploits often used at bureaus like \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2016\/09\/02\/making-noise\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4935","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=4935"}],"version-history":[{"count":1,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4935\/revisions"}],"predecessor-version":[{"id":4937,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/4935\/revisions\/4937"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=4935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=4935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=4935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}