US needs digital warfare force

#21
OOTS 1st Law of Digital Warfare - 99% of everything said on the subject is crap.

OOTS 2nd Law of Digital Warfare - if you want to keep it secret do not connect it to the internet.

OOTS 3rd Law of Digital Warfare - if some bored 15 year old or autistic UFO nut roots your server then they are not an Evil Hacker on Steroids (TM); the person responsible for your network security is incompetent.

OOTS 4th Law of Digital Warfare - amateurs discuss technical details, professionals discuss social engineering.

OOTS 5th Law of Digital Warfare - given the choice between network disruption linked to foreign affairs being caused by:
A. Top Secret Techno-Ninja Black Ops military units belonging to a nation state;
B. Bored 15 year olds who know they won't get into trouble for using the opportunity to be "patriotic";
Choose B every time.

OOTS 6th Law of Digital Warfare - the answer to your security problems is never a new organisation, consultants and Powerpoint.

OOTS 7th Law of Digital Warfare - the Internet exists to make copies of digital information; consider this fully before placing your information in digital form.

OOTS 8th Law of Digital Warfare - if the enemy is inside your OODA loop then there is no single monolithic enemy; you are witnessing the emergent properties of digital flash mobs.
 
#22
I'd heartily recommend reading "Halting State" by Charles Stross. It's a very well-written novel, only a couple of years old, and already several of its themes have come true...
 
#23
One_of_the_strange said:
OOTS 1st Law of Digital Warfare - 99% of everything said on the subject is crap.

OOTS 2nd Law of Digital Warfare - if you want to keep it secret do not connect it to the Internet.

OOTS 3rd Law of Digital Warfare - if some bored 15 year old or autistic UFO nut roots your server then they are not an Evil Hacker on Steroids (TM); the person responsible for your network security is incompetent.

OOTS 4th Law of Digital Warfare - amateurs discuss technical details, professionals discuss social engineering.

OOTS 5th Law of Digital Warfare - given the choice between network disruption linked to foreign affairs being caused by:
A. Top Secret Techno-Ninja Black Ops military units belonging to a nation state;
B. Bored 15 year olds who know they won't get into trouble for using the opportunity to be "patriotic";
Choose B every time.

OOTS 6th Law of Digital Warfare - the answer to your security problems is never a new organisation, consultants and Powerpoint.

OOTS 7th Law of Digital Warfare - the Internet exists to make copies of digital information; consider this fully before placing your information in digital form.

OOTS 8th Law of Digital Warfare - if the enemy is inside your OODA loop then there is no single monolithic enemy; you are witnessing the emergent properties of digital flash mobs.
OOTS... Order Of The Stick :?

Excellent, sow disinformation to throw them off the scent....

The Biologically-Inspired Tactical Security Infrastructure (BITSI) program hosted over MANETs is the practical application of Danger Theory, it should help avert battle field casualties in the event of all out iWar. If the MKV's are ready then it'll only take a minute or two to permanently decommission the satellites, always handy to have an extra string for the bow, man ;)
 

Similar threads

Latest Threads

Top