Farewell. The Flying Pig Has Left The Building.

Steve Hynd, August 16, 2012

After four years on the Typepad site, eight years total blogging, Newshoggers is closing it's doors today. We've been coasting the last year or so, with many of us moving on to bigger projects (Hey, Eric!) or simply running out of blogging enthusiasm, and it's time to give the old flying pig a rest.

We've done okay over those eight years, although never being quite PC enough to gain wider acceptance from the partisan "party right or wrong" crowds. We like to think we moved political conversations a little, on the ever-present wish to rush to war with Iran, on the need for a real Left that isn't licking corporatist Dem boots every cycle, on America's foreign misadventures in Afghanistan and Iraq. We like to think we made a small difference while writing under that flying pig banner. We did pretty good for a bunch with no ties to big-party apparatuses or think tanks.

Those eight years of blogging will still exist. Because we're ending this typepad account, we've been archiving the typepad blog here. And the original blogger archive is still here. There will still be new content from the old 'hoggers crew too. Ron writes for The Moderate Voice, I post at The Agonist and Eric Martin's lucid foreign policy thoughts can be read at Democracy Arsenal.

I'd like to thank all our regular commenters, readers and the other bloggers who regularly linked to our posts over the years to agree or disagree. You all made writing for 'hoggers an amazingly fun and stimulating experience.

Thank you very much.

Note: This is an archive copy of Newshoggers. Most of the pictures are gone but the words are all here. There may be some occasional new content, John may do some posts and Ron will cross post some of his contributions to The Moderate Voice so check back.


----------------------------------------------------------------------------------------------------

Friday, October 8, 2010

Cyberwarfare Works on Same Premises as Nuclear War

By Russ Wellen



The computer worm Stuxnet didn't exactly bore into the computers of workers in Iran's nuclear program. In fact, whoever unleashed it -- Israel or another state -- sprayed it indiscriminately like machine gun fire. John Markoff of the New York Times reports:

The most striking aspect of the fast-spreading malicious computer program � which has turned up in industrial programs around the world and which Iran�said had appeared in the computers of workers in its nuclear project � may not have been how sophisticated it was, but rather how sloppy its creators were in letting a specifically aimed attack scatter randomly around the globe.
Thus, perhaps because of a perceived time crunch on the part of the creators, it created what Markoff called "collateral damage" as if it were a military attack. Now for a riddle: name the weapon which never causes collateral damage? Nuclear weapons. Civilians, of course, form the better part of their intended targeted and are in no sense of the word collateral.



But cyberwarfare resembles nuclear weapons in other ways. Markoff also writes that cyberwarfare is . . .

. . . also raising fear of dangerous proliferation. . . . "Proliferation is a real problem, and no country is prepared to deal with it," said Melissa Hathaway, a former United States national cybersecurity coordinator. The widespread availability of the attack techniques revealed by the software has set off alarms among industrial control specialists, she said: "All of these guys are scared to death. We have about 90 days to fix this before some hacker begins using it."
Of course, with nuclear weapons, proliferation occurs at a glacial pace compared with malware. In other words, the dangers of proliferation, purely as a concept, are much greater with a worm. To a certain extent, the immediacy of the threat of worms and viruses makes up for the immensity of the threat from nuclear weapons.



At War in Context, Paul Woodward called Stuxnet the Trinity test of Cyberwarfare. Which brings us to the most important similarity between nuclear war and cyberwarfare: love it or leave it -- deterrence. Woodward rhetorically asks what the implications of Stuxnet are.

1. Iran has been served notice that not only its nuclear facilities but its whole industrial infrastructure is vulnerable to attack. As�Trevor Butterworth�noted: "By demonstrating how Iran could so very easily experience a Chernobyl-like catastrophe, or the entire destruction of its conventional energy grid, the first round of the 'war' may have already been won."



2. The perception that it has both developed capabilities and shown its willingness to engage in cyberwarfare, will serve Israel as a strategic asset even if it never admits to having launched Stuxnet.

That's why Woodward compares the Stuxnet attack to Trinity, the first U.S. nuclear test. A demonstration of the weapon's power, it was intended to act as a deterrent to keep other states, such as Iran, from . . . what exactly? It might only motivate Iran to complete the nuclear-weapon development process. After all, it wouldn't want to be two weapon systems -- nuclear and cyber -- down on Israel, would it?



First posted at Focal Points.

No comments:

Post a Comment