Farewell. The Flying Pig Has Left The Building.

Steve Hynd, August 16, 2012

After four years on the Typepad site, eight years total blogging, Newshoggers is closing it's doors today. We've been coasting the last year or so, with many of us moving on to bigger projects (Hey, Eric!) or simply running out of blogging enthusiasm, and it's time to give the old flying pig a rest.

We've done okay over those eight years, although never being quite PC enough to gain wider acceptance from the partisan "party right or wrong" crowds. We like to think we moved political conversations a little, on the ever-present wish to rush to war with Iran, on the need for a real Left that isn't licking corporatist Dem boots every cycle, on America's foreign misadventures in Afghanistan and Iraq. We like to think we made a small difference while writing under that flying pig banner. We did pretty good for a bunch with no ties to big-party apparatuses or think tanks.

Those eight years of blogging will still exist. Because we're ending this typepad account, we've been archiving the typepad blog here. And the original blogger archive is still here. There will still be new content from the old 'hoggers crew too. Ron writes for The Moderate Voice, I post at The Agonist and Eric Martin's lucid foreign policy thoughts can be read at Democracy Arsenal.

I'd like to thank all our regular commenters, readers and the other bloggers who regularly linked to our posts over the years to agree or disagree. You all made writing for 'hoggers an amazingly fun and stimulating experience.

Thank you very much.

Note: This is an archive copy of Newshoggers. Most of the pictures are gone but the words are all here. There may be some occasional new content, John may do some posts and Ron will cross post some of his contributions to The Moderate Voice so check back.


----------------------------------------------------------------------------------------------------

Saturday, September 25, 2010

The Future is Arriving

By BJ Bjornson

It is one of those staples of apocalyptic science fiction; one of two sides locked in a long-term adversarial struggle decides to unleash some grand biological weapon, a supervirus of sorts, aimed at wiping out their enemy, only things spin out of control, the virus spreads, and the creators join the targets and innocent bystanders as its victims.

Fortunately, the biological version of this has remained fictional, but it appears that a technological version of the story is already becoming reality.


The technology industry is being rattled by a quiet and sophisticated malicious software program that has infiltrated factory computers.

The malware, known as Stuxnet, was discovered in mid July, at least several months after its creation, by VirusBlokAda, a Belarussian computer security company that was alerted by a customer.

. . .

Eric Chien, the technical director of Symantec Security Response, a security software maker that has studied Stuxnet, said it appears that the malware was created to attack an Iranian industrial facility. Security experts say that it was likely staged by a government or government-backed group, in light of the significant expertise and resources required to create it. The specific facility that was in Stuxnet�s crosshairs is not known, though speculation has centered on gas and nuclear installations.

. . .

Exactly what Stuxnet might command industrial equipment to do still isn�t known. But malware experts say it could have been designed to trigger such Hollywood-style bedlam as overloaded turbines, exploding pipelines and nuclear centrifuges spinning so fast that they break. �The true end goal of Stuxnet is cyber sabotage. It�s a cyber weapon basically,� said Roel Schouwenberg, a senior antivirus researcher at Kaspersky, a security software maker. �But how it exactly manifests in real life, I can�t say.�

 
With the increasing reliance of our technological civilization on computers and networks, cyberattacks have become something of a common occurrence in the last several years, though previous manifestations, like that suffered by Estonia during a dispute with Russia, were generally more swarm-based hacker attacks rather than what appears to be a state-sponsored viral sabotage campaign. Still, it is quite easy to see this kind of thing escalating and evolving in the very near future, with players soon including corporations targeting competitors as well as the state-on-state versions, followed no doubt by other non-state actors.

It should prove an interesting time.



2 comments:

  1. Anyone else vote for Israel as the source?

    ReplyDelete
  2. Crossed my mind Ron, but my money would actually be on an agency on this side of the Atlantic, at the very least for a considerable assist. When you read the full story, the malware had aspects not only from what may be proprietary knowledge from Microsoft and Seimens, but from intellectual property stolen from buildings in Taiwan. Smells of a more globally-oriented organization, even if used for a more regional purpose in this case.

    ReplyDelete