Saturday, July 11, 2009

Cyberattack False Flag? (Greater Transparency Needed in Development of U.S. Policy on Cyberattack)

The various cyberattacks continue into their 2nd week throughout the world. I've blogged about these cyberattacks here over this time. As I do further online research into the global network, my knowledge increases and additional perspectives are achieved. While the mainstream media focuses on the celebrity aspect and the overall fear that something really horrible is going to happen as a result of these cyberattacks.

The threat is growing of attacks with the possibility of taking down critical national infrastructure systems. Embedded code was discovered in the U.S. power grid two years ago, which could have potentially damaged power supply, two former federal officials told CNN in April.

However, has anyone considered that these cyberattacks may be conducted by internal organizations operating under the color of official governments, including rogue elements of our own government? Wouldn't a powerful cyberattack require powerful resources beyond the reach of most individual people and usually only within the reach of governments and nation-states?

Therefore, it is quite foreseeable that these cyberattacks could be the result of some wargame or training exercise for the military industrial complex in this country or elsewhere. We have tried to pin these attacks on North Korea, but so far, there is no direct evidence.

The booklet based upon the April 29, 2009 report "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities" (you can read full report here or below) by the National Academy of Sciences discusses its recommendations for and analyses of the U.S. government's position on cyberattacks, including their possible uses against adversaries and for wargaming.

From page 8 of the booklet in connection with its recommendations to the U.S. government:

The U.S. government should conduct high-level wargaming exercises to understand the dynamics and potential consequences of cyberconflict.


Source: CNN; National Academy of Sciences

No comments: