um, If the enemy thinks their own IT guy crashed the site, then it was
a covert operation (or a bug). If the site goes down and the redirect
goes to a .mill domain, then it is a traditional military activity (or
a bug). In love and war, almost everything can (now) be attributed to
a bug....
and stop asking the lawyers about technical things - if you lawyer up
the world, it will stop spinning(RTFM).
:) Ed
On Fri, Mar 19, 2010 at 1:15 PM, Mike Schwartz <
schwartz@acm.org> wrote:
> This W
> ashington Post
> article:
> http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464.html
> was summarized in (and linked to, from)
> ACM's TechNews:
> http://technews.acm.org/archives.cfm?fo=2010-03-mar/mar-19-2010.html#455307
> The
> summary says:
> Dismantling of Saudi-CIA Web Site Illustrates Need for Clearer Cyberwar
> Policies
> Washington Post (03/19/10) P. A1; Nakashima, Ellen; Priest, Dana; DeYoung,
> Karen
>
> The dissolution of an intelligence-gathering Web site set up by the Saudi
> government and the U.S. Central Intelligence Agency (CIA), based on
> suspicions that it was being used by extremists planning attacks on U.S.
> forces in Iraq, highlights the need for more transparent cyberwar policies.
> The use of computers to collect intelligence or to disrupt the enemy raises
> a number of issues, including under what circumstances a cyberattack outside
> the theater of war is permissible and whether dismantling an extremist Web
> site represents a covert operation or a traditional military activity.
> Current and former officials say that lawyers at the U.S. Justice
> Department's Office of Legal Counsel are engaged in a struggle to define the
> legal rules governing cyberwarfare. A key dilemma of cyberwarfare is that an
> attacker can never be sure that only the intended target will be impacted by
> an attack. A former official notes than more than 300 servers in Saudi
> Arabia, Germany, and Texas were unintentionally disrupted when the Saudi-CIA
> site was dismantled.
> View Full Article - May Require Free Registration | Return to Headlines
> and here are some juicy quotes [IMHO] from the original
> W
> ash. Post article:
>> The Saudi-CIA Web site was set up several years ago as a "honey pot,"
>> [...]
>> [...] some experts counter that dismantling Web sites is ineffective -- no
>> sooner does a site come down than a mirror site pops up somewhere
>> else. [...]
>> "It seems difficult to understand," he [Evan F. Kohlmann] [a terrorism
>> researcher] added, "why governments would interrupt [...] a lucrative
>> intelligence-gathering tool."
> ("forwarded" by:)
> --
> Mike Schwartz
> Glendale AZ
> schwartz@acm.org
>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss