talonkarrde: (Default)
[personal profile] talonkarrde
Ladies and Gentlemen, let me welcome you to the next world war: one that's going on as we speak.

No, you don't need to look outside your window; there are no bombs, or troops establishing beachheads, or four-star generals poring over a map in a hidden bunker somewhere. Or if they're poring over a map, it doesn't depict any land range. The battlefield is one that can't be visualized like that.

You see, the salvos being launched are packets of data; the generals are men and women, often sitting in their own homes, in front of their computers; and the collateral damage... is still the lives and well-beings of innocents, the same it's always been.

The threat is more distributed than any in history. It comes not from one army, as in the time of Alexander the Great, nor from multiple fronts, as in World War II, nor even the impossibility of fighting insurgents in a hostile province, like we see in Afghanistan. It is global, with pockets of activity in every major country, some sponsored by foreign powers, but many freelance.

They used to be called hackers, and they used to send viruses that would crash individual computers. Blaster was an early one, a worm that would shut down your computer after you started up, no matter what you did. But as viruses go, Blaster wasn't that successful, even though it spread widely and took many computers down for days, or even weeks.

Think about it: parasites survive and reproduce the best when they don't kill the host — when, in fact, they're not detected at all. A mosquito that can suck your blood without you noticing it is going to pass on its genes; the one you squashed because you felt the itch is not.

So viruses evolved, changing their methods of attack, their goals, their execution. They stopped being spread by email and started masquerading as Windows alerts and, ironically, anti-virus programs; they started infecting and collecting information; they started waiting for commands from a foreign source.

The last trait is the most chilling, because it changes computers infected from being simple dummy robots that can only execute a few lines of code (no matter how disastrous they are) to an army that can adapt on the fly to threats that challenge it. The biggest army in cyberspace right now isn't owned by a corporation or a government — it's called Conficker, and it has more than 7 million computers in up to 200 countries under its control. Conficker has infected government computers, hospital computers, and, of course, the computers of people like you and me.

That is the enemy — a general who is open to the highest bidder, who has millions of computers across America that he can take at a moment's notice, forming them to become a weapon that can down almost any connected system. And nowadays, there are many, many systems that are connected, from mass transit to patient records, from government resources to corporate networks.

How do we fight them? Well, our government has admittedly been slow to respond. One of the biggest problems is that the military has always been a reactive force, one that always learns to fight the enemy that it just defeated — the Maginot Line, for example, is a great example. Part of this is because the leaders and generals who are good at anticipating the enemy in one war are rarely insightful enough to see past their area of expertise. Part of this is because we never really fight the same war twice, because there are always different actors involved, different technology deployed, and different situations that arise. And part of this is because our enemy is always going to be smaller, more fluid, and thus able to respond faster than we are.

There are defenses, though. In America, organizations like the NSA, or the United States Cyber Command, are fighting against those who would seek to destroy us. But most importantly, this is a war where normal citizens, more than in any other war, will be able to lend assistance. Security researchers may come up with defenses that the government can't dream of; one teenager in his room may be able to propose an attack that would completely wipe out the enemy. In decades past, this would have been ludicrous.

But we won't all be programmers that understand the fine points of honeypots or penetration testing. As always, some of us will be civilians, and the best we can hope for is that attacks won't be successful, our sites that we visit won't go down, and our lifestyles won't be disrupted. But again, more than any civilians in wars that have come before us, we have an obligation to act.

We must secure ourselves. We must defend our computers from those that would seek to use it, and we must educate ourselves on the many forms attacks can take. We may not be able to win the war, but we must be aware enough to not unwittingly become pawns of the enemy.

Thus: learn. Learn about security, about how to keep your computer your own and not the agent of a foreign power, or unfriendly hacker, or terrorist group. Learn that there is more than just Facebook and Google out there, and learn about how connected everything really is.

Learn about how vulnerable you are, and then fix it.

Date: 2010-03-24 11:19 pm (UTC)
From: [identity profile] attheonesix.livejournal.com
Good timing is good.


But seriously, it's appropriate, especially given that I can literally hear you in the last line =P

Date: 2010-03-24 11:32 pm (UTC)
From: [identity profile] baxaphobia.livejournal.com
Well written and so true. And scary!

Date: 2010-03-25 01:17 am (UTC)
From: [identity profile] oneonthefence.livejournal.com
This is awesome. Seriously. I really hear your voice in this one. Excellent work.

Date: 2010-03-25 02:12 am (UTC)
From: [identity profile] fourzoas.livejournal.com
I remember with great clarity the hopes and dreams of educators when personal computers started flooding schools back in the 80s. They taught us to program the machines, and while I don't do any coding of note these days, I know that I think very differently about technology than my students do because my own introduction to it was founded in creation and not consumption. Great post and reminder!

Date: 2010-03-25 03:08 am (UTC)
From: [identity profile] comedychick.livejournal.com
Googled conficker because I hadn't heard of it. It won't affect my computers because I refuse to use Windows now (and a good portion of my reasoning is because I want less chance of viruses and so forth). Still, with the kinds of computers that could be infected, the result of an attack could be very scary :/

Date: 2010-03-25 03:24 am (UTC)
From: [identity profile] lawchicky.livejournal.com
Gee that's awfully scary.

Date: 2010-03-25 05:06 am (UTC)
From: [identity profile] karmasoup.livejournal.com
I'm still avoiding the whole Facebook thing... I think LiveJournal as it is is too much trivial drivel, but, I have a social collection of geeks, how are religious zealots of lifehacker, and love to share, so, they're always keeping me in their ring of protection.

Date: 2010-03-25 03:54 pm (UTC)
From: [identity profile] onda-bianca.livejournal.com
Golly, it is quite scary!

Date: 2010-03-25 07:10 pm (UTC)
From: [identity profile] similiesslip.livejournal.com
This is a good reminder.

I hadn't thought of it like a war though I have heard that "websites were attacked"

I have no idea where it was but it seems I read a book or saw a show in which the computers fought the wars, like through propability? Like, they would crunch the numbers about how many would probably die if a battle took place and that number of people agreed to "report" to die. And so on, battle by battle.

Scary!

Your post makes me think of that. There is always someone ready to take things a step further.

Date: 2010-03-26 06:43 am (UTC)
From: [identity profile] theafaye.livejournal.com
This is why I'm glad I'm married to a security expert! Any computer with internet access has the potential to be at risk, regardless of type of system. Without him, I'd have been repeatedly infected for years!

Date: 2010-03-26 02:00 pm (UTC)
From: [identity profile] teaberryblue.livejournal.com
I JUST had this conversation at work yesterday about how we need to take security seriously here!

Date: 2010-03-26 02:33 pm (UTC)
From: [identity profile] roina-arwen.livejournal.com
Well written, well reasoned, and a damn fine entry!

Date: 2010-03-26 08:47 pm (UTC)
From: [identity profile] cacophonesque.livejournal.com
This was really engaging! Even though it's different from what you usually write, it was written WELL. And, it made what is often rather dry subject matter into something alive and interesting!

Date: 2010-03-26 08:56 pm (UTC)
shadowwolf13: (Default)
From: [personal profile] shadowwolf13
And this is why I'm very glad that Mr. Boyfriend is up on security. :)

Date: 2010-03-27 12:20 am (UTC)
From: [identity profile] beautyofgrey.livejournal.com
What a great topic, and I love the approach you used.

I need to know more about security. I use the standard software, and occasionally call on my IT pal at work...but still, knowledge is power.

*insert G.I. Joe musical theme here*

Date: 2010-03-27 12:33 am (UTC)
From: [identity profile] beeker121.livejournal.com
I'm still not on facebook, and now that I'm hearing a lot of new viruses are getting sent into the world that way I think I'll stay off. I've gotten better about my computer, but need to keep working on it. Thanks for the well written reminder.

Date: 2010-03-27 01:44 am (UTC)
From: [identity profile] imafarmgirl.livejournal.com
This was interesting. I really liked it.

Date: 2010-03-27 06:33 am (UTC)
From: [identity profile] crimsonplum.livejournal.com
I think I just learned a whole lot more about you...and I really like it. :) Very smart, and very well done, hon.

Date: 2010-03-27 10:51 am (UTC)
From: [identity profile] joeymichaels.livejournal.com
Can you image what viruses are going to be like in even two years? We're still in the Carboniferous period, my friend.

Date: 2010-03-27 11:24 am (UTC)
From: [identity profile] rattsu.livejournal.com
YES to this. Brilliant take on the subject.

Date: 2010-03-28 06:44 am (UTC)
connie: (Default)
From: [personal profile] connie
Yes, yes, yes! People absolutely do not take internet security seriously enough. Thank you for bringing attention to this!

Profile

talonkarrde: (Default)
Talon

July 2025

S M T W T F S
  12345
678 9101112
13141516171819
20212223242526
2728293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Mar. 14th, 2026 02:11 am
Powered by Dreamwidth Studios