 |
Posted by Paul Szynol on Thursday, February 13 @ 20:43:30 EST
|
|
|
 |
 |
|
 |
| |
 |
Related Links |
 |
 |
|
 |
 |
Options |
 |
| The comments are owned by the poster. We aren't responsible for their content. |
|
|
Re: Patriotic Hacking (Score: 0) by Anonymous on Thursday, February 13 @ 23:48:04 EST | Bruce Schneier touched upon the parts of a decision tree that might be followed in choosing whether or not the government might launch a cyber attack in his January Crypto-Gram. Given the following passage I can see why the federales might want to hold off on issuing any cyber-Letters of Marque.One important thing to remember here is that you only want to shut an enemy's network down if you aren't getting useful information from it. The best thing to do is to infiltrate the enemy's computers and networks, spy on them, and surreptitiously disrupt select pieces of their communications when appropriate. The next best thing is to passively eavesdrop. After that, the next best is to perform traffic analysis. Only if you can't do any of that do you consider shutting the thing down. Strangely, his writing on this topic was prompted by an interview with an Iranian newspaper.My PitifulBlog |
[ Reply to This ]
|
|
|