<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber defense Archives - Sky&#039;s Blog</title>
	<atom:link href="https://blog.red7.com/tag/cyber-defense/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.red7.com/tag/cyber-defense/</link>
	<description>Communicating in a networked world</description>
	<lastBuildDate>Mon, 02 Jan 2017 20:04:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.red7.com/wp-content/uploads/2018/01/skyhi-wind-icon-256x256-120x120.png</url>
	<title>cyber defense Archives - Sky&#039;s Blog</title>
	<link>https://blog.red7.com/tag/cyber-defense/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Private armies in cyberspace? A kill switch on the Internet?</title>
		<link>https://blog.red7.com/private-armies-in-cyberspace/</link>
					<comments>https://blog.red7.com/private-armies-in-cyberspace/#respond</comments>
		
		<dc:creator><![CDATA[sky]]></dc:creator>
		<pubDate>Wed, 14 Jul 2010 16:09:19 +0000</pubDate>
				<category><![CDATA[CyberSpark]]></category>
		<category><![CDATA[Our networked world]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber war]]></category>
		<guid isPermaLink="false">http://blog.red7.com/?p=2800</guid>

					<description><![CDATA[<p>The government of the USA was constituted “to provide for the common defense” among other things.[1] Unfortunately the line between public responsibility and private responsibility for defense in cyberspace could be rather blurry. Clearly when there is warfare in the physical world the combatants are also likely to utilize cyber tactics of some sort, even [&#8230;]</p>
<p>The post <a href="https://blog.red7.com/private-armies-in-cyberspace/">Private armies in cyberspace? A kill switch on the Internet?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-991" style="border: 0pt none; margin: 4px 12px;" title="cloud" src="/wp-content/uploads/2009/01/cloud.jpg" alt="" width="64" height="64" />The government of the USA was constituted “to provide for the common defense” among other things.<sup>[1]</sup> Unfortunately the line between public responsibility and private responsibility for defense in cyberspace could be rather blurry.</p>
<p>Clearly when there is warfare in the physical world the combatants are also likely to utilize cyber tactics of some sort, even if only for informational or propaganda purposes, but more likely as powerful tactics to take down their target’s ability to respond quickly or in a focused manner. Because governments aren’t really equipped to handle these types of attacks, which would include attacks against private infrastructure, not just government systems, they’d have to rely on private companies, individuals and groups — essentially private armies — to deflect or thwart any attack.<span id="more-2800"></span></p>
<p>There are some problems inherent in cyber attacks that make any kind of defense really tricky:</p>
<p>* During a cyber attack against private or military targets online, one might not be able to determine whether the attacker is civilian, criminal or military;</p>
<p>* Online <em>citizen militias</em> (hackers motivated by patriotism) could be impossible to distinguish from organized military cyber-attackers;</p>
<p>* <em>Collateral cyber-damage</em> to (or the freezing of, or interference with) the economic mechanisms that make daily life possible could paralyze large areas if not whole countries; the idea that a government (say the President of the US under the proposed cybersecurity bill) could <a href="http://www.cio.com/article/597783/Senate_Panel_Approves_Controversial_Cybersecurity_Bill?source=CIONLE_nlt_infosec_2010-06-25" target="_blank">shut down key elements of the Internet for up to 120 days</a> without legislative recourse[2], could be more dangerous than the attacks themselves;</p>
<p>* An ISP in any particular country (say the US, for example) might be conflicted about whether to allow a sudden flood of traffic to pass through its network to “attack” some foe, or whether to stop that flood in order to preserve its ability to serve  customers—in fact the ISP probably wouldn’t be able to tell the difference;</p>
<p>In a sense, were someone to “shut off the Internet,” which proponents say S 3480 does not allow, it would be suicidal, since the defenders would also lose their ability to communicate with each other and to thwart any attack. Turning off the Internet would not only deny your opponent a playing field, but would deny defenders the ability to respond. And the collateral damage would be that all financial, manufacturing, transportation and other systems that depend on the net would also shut down</p>
<p>Lots of room for debate, but clearly governmental agencies and legislatures are beginning to think about the necessary means and the possible limits of their actions.</p>
<hr />
<p>[1] <em>We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.</em></p>
<p>[2] The <a href="http://hsgac.senate.gov/public/?FuseAction=home.Cybersecurity" target="_blank">Protecting Cyberspace as a National Asset Act</a> of 2010; some fear that this bill provides a “kill switch” the President of the US could use to “turn off” the Internet;</p>
<p>[-] <a href="http://www.guardian.co.uk/world/2010/may/23/us-appoints-cyber-warfare-general" target="_blank"><em>US Appoints first Cyberwarfare General</em></a> in guardian.co.uk</p>
<p>[-] EU Committee in UK on <a href="http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/6802.htm" target="_blank">protecting Europe against large-scale cyber-attacks</a></p>
<p>The post <a href="https://blog.red7.com/private-armies-in-cyberspace/">Private armies in cyberspace? A kill switch on the Internet?</a> appeared first on <a href="https://blog.red7.com">Sky&#039;s Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.red7.com/private-armies-in-cyberspace/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2800</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: blog.red7.com @ 2026-04-14 23:36:40 by W3 Total Cache
-->