Assassin's Mace - Scenario di attacco cybernetico Assassin's Mace - Scenario di attacco cybernetico

Risultati da 1 a 6 di 6

Discussione: Assassin's Mace - Scenario di attacco cybernetico

Visualizzazione Ibrida

Messaggio precedente Messaggio precedente   Nuovo messaggio Nuovo messaggio
  1. #1
    Senior Member L'avatar di Necrotemus
    Data Registrazione
    Jan 2016
    Località
    Lothian
    Messaggi
    2.103

    Assassin's Mace - Scenario di attacco cybernetico

    Assassin's Mace (Chinese: 杀手锏; pinyin: Shāshǒujiàn) is a Chinese term composed of the characters for "kill", "hand", and "mace".[1] This term has its roots in ancient Chinese folklore, which recounts how a hero wielding such a weapon managed to overcome a far more powerful adversary. "Shashou Jian" was a club with which the "assassin" incapacitated his enemy, suddenly and totally, instead of fighting him according to "the rules."
    The novel Assassin's Mace by Author, Evan Pedone, discusses the use of the Assassin's Mace as a weapon which brings the world into World War 3, almost annihilating the United States dominance in the world.
    The scope and detail of the attack, not to mention its sheer audacity, had earned the grudging respect of the secretary. Years of worry about a possible Chinese "Assassin's Mace"-a silver bullet super-weapon capable of disabling key parts of the American military-turned out to be focused on the wrong thing.
    The cyber attacks varied. Sailors stationed at the 7th Fleet' s homeport in Japan awoke one day to find their financial accounts, and those of their dependents, empty. Checking, savings, retirement funds: simply gone. The Marines based on Okinawa were under virtual siege by the populace, whose simmering resentment at their presence had boiled over after a YouTube video posted under the account of a Marine stationed there had gone viral. The video featured a dozen Marines drunkenly gang-raping two teenaged Okinawan girls. The video was vivid, the girls' cries heart-wrenching the cheers of Marines sickening And all of it fake. The National Security Agency's initial analysis of the video had uncovered digital fingerprints showing that it was a computer-assisted lie, and could prove that the Marine's account under which it had been posted was hacked. But the damage had been done.
    There was the commanding officer of Edwards Air Force Base whose Internet browser history had been posted on the squadron's Facebook page. His command turned on him as a pervert; his weak protestations that he had not visited most of the posted links could not counter his admission that he had, in fact, trafficked some of them. Lies mixed with the truth. Soldiers at Fort Sill were at each other's throats thanks to a series of text messages that allegedly unearthed an adultery ring on base.
    The variations elsewhere were endless. Marines suddenly owed hundreds of thousands of dollars on credit lines they had never opened; sailors received death threats on their Twitter feeds; spouses and female service members had private pictures of themselves plastered across the Internet; older service members received notifications about cancerous conditions discovered in their latest physical.

    Leadership was not exempt. Under the hashtag # PACOMMUSTGO a dozen women allegedly described harassment by the commander of Pacific command. Editorial writers demanded that, under the administration's "zero tolerance" policy, he step aside while Congress held hearings.
    There was not an American service member or dependent whose life had not been digitally turned upside down. In response, the secretary had declared "an operational pause," directing units to stand down until things were sorted out.
    Then, China had made its move, flooding the South China Sea with its conventional forces, enforcing a sea and air identification zone there, and blockading Taiwan. But the secretary could only respond weakly with a few air patrols and diversions of ships already at sea. Word was coming in through back channels that the Taiwanese government, suddenly stripped of its most ardent defender, was already considering capitulation.

    Author’s note: In this vignette an adversary uses the personally identifiable information gleaned from the 2015 hack of the Office of Personnel Management (OPM) and potentially from other hacks, yet unknown. OPM holds the official records for millions of government personnel, including members of the military. The level of detail and amount of sensitive information in these records would allow an adversary to disrupt a servicemember’s medical and financial records, email, social media accounts, and personal electronic devices. Col. John Boyd once said that the best way to destroy the cohesion of an organization was by spreading mistrust and discord. A cyber attack as described in this vignette would do just that. The attack would not prevent a U.S. military response because eventually enough of the disruption would be settled out. However, it would slow a response and that might be all an adversary needed.
    China has been relentless in attacking U.S. networks and, apparently, has had some success.
    Aside from OPM, other American government agencies have also been breached and thus shown vulnerabilities. Cyber intrusions into Britain’s National Institute of Health, for example, demonstrated how personal medical information is vulnerable on a massive scale



    Altra roba qui https://csis-prod.s3.amazonaws.com/s...JWoVsNT_xSxOiu


  2. #2
    Lo Stronzo Maligno
    Data Registrazione
    Jul 2017
    Messaggi
    1.651

    Re: Assassin's Mace - Scenario di attacco cybernetico

    Nella realtà non ci sarebbe nessuna "operational pause" se le informazioni divulgate fossero false; anzi, sarebbe più probabile che dall'espansione cinese ne scaturisse un conflitto (ma non ci sarebbe nessuna espansione, perchè l'attacco sarebbe fallito). Il problema sorge nel momento in cui scheletri veri escono dall'armadio e solo dagli armadi dei vertici. Il resto è fuffa alla quale si può rimediare in pochi giorni.

    Qualsiasi attacco che involve l'opinione pubblica dev'essere protratto nel tempo e iniziare gradualmente, mentre gli attacchi a sorpresa fanno leva sulla forza bruta e mirano direttamente all'obiettivo.
    I primi sono strategici, i secondi solamente tattici.

  3. #3
    Bannato
    Data Registrazione
    May 2018
    Messaggi
    798

    Re: Assassin's Mace - Scenario di attacco cybernetico

    "Ragazzi, è tutto falso, son stati i cinesi"

    Bon

  4. #4
    Lo Stronzo Maligno
    Data Registrazione
    Jul 2017
    Messaggi
    1.651

    Re: Assassin's Mace - Scenario di attacco cybernetico

    i thread interessanti non se li caga nessuno

  5. #5
    Senior Member L'avatar di Necrotemus
    Data Registrazione
    Jan 2016
    Località
    Lothian
    Messaggi
    2.103

    Re: Assassin's Mace - Scenario di attacco cybernetico

    Appena ho tempo scrivo di piu'.

    Lo scenario che ho postato, fa parte di un report (linkato) che parla dell'elemento sorpresa in preparazione di un attacco o come diversivo. L'esempio mi piaceva in quanto richiamava un possibile uso dei dati sensibili sottratti anni fa


  6. #6
    Senior Member L'avatar di Gilgamesh
    Data Registrazione
    Jan 2016
    Messaggi
    20.520

    Re: Assassin's Mace - Scenario di attacco cybernetico

    Gli scenari ipotetici alla fine sono goduriosissimi
    adoro queste robe alla Tom Clancy

Permessi di Scrittura

  • Tu non puoi inviare nuove discussioni
  • Tu non puoi inviare risposte
  • Tu non puoi inviare allegati
  • Tu non puoi modificare i tuoi messaggi
  •  
Chi Siamo
Forum ufficiale della rivista
The Games Machine
Seguici su