Skip to main content

Home/ GAVNet Collaborative Curation/ Group items tagged hacking

Rss Feed Group items tagged

Bill Fulkerson

Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware - Motherboard - 1 views

  •  
    Posted to CVI on Slack
Steve Bosserman

WikiLeaks' Gift to American Democracy - The New York Times - 0 views

  • In this, the year of the leak, the hackers are contributing to a phenomenon — raw transparency — that should make democracy stronger.
Bill Fulkerson

Links 8/3/17 | naked capitalism - 0 views

  • uarterBack August 3, 2017 at 8:31 am Re NYT Hacking Wars story, I have long had the same “self-licking ice cream cone” concerns. The military industrial complex has been slowly shaping polic opinion to make “kenetic” response to cyber attacks palatable. Consider this 2013 article: https://armscontrolnow.org/2013/05/30/is-there-a-place-for-nuclear-deterrence-in-cyberspace/ Cyber as a Casus Belli has two inherent fatal flaws in its inability to accurately prove attribution and the extent of damage. The former makes it impossible to know if a counter attack is against a party that had any role in the original cyber attack, and the latter makes it impossible to prove or verify harm, which is the foundation of the “proportional response” required under the international laws of war. These two flaws can raise the potential of false flags to a new level. Do we really want to shed blood of untold numbers of military and civilian soles because of a report of a unattributable cyber attack on a purported “crital infrastructure component” that nobody every heard of,and that cannot be confirmed as existing in the first place? Gulf of Tonkin, eat your heart out. Look no further than our present history. We are slowly moving towards war with Russia based on the premise of a cyber attack that may, or may not, have actually happened, and no one has been allowed to inspect the physical servers related to the claimed attack. International laws of war should be clear that kenetic response to cyber attacks must be off the table. The only acceptable proportionate attacks should e economic or offensive cyber. Full stop.
1 - 20 of 21 Next ›
Showing 20 items per page