03.02.12
Blow up a dam from the Internet
UPDATED
The end-of-the-week ludicrous quote worth citation comes out of the RSA Security Conference, held this week in San Francisco.
The conference is full of corporate computer security big names — and a lot of total nobodies grasping at straws. It’s famous for good exaggeration and hand-waving claims made just for the sake of publicity.
From one of the nobodies, a company called Zscaler:
SCADA systems used in industrial facilities could represent a target for cyberterrorist attacks. “If you’re talking about terrorism in the real world where you want to blow up a dam or do some destruction, you can potentially do that remotely through a cyber attack,” Geide said. The technology required to do this already exists, he said.
Extraordinary claims require extraordinary evidence. Not arguments from pseudo-authority at vendor conferences.
Panel discussions piled fearmongering upon fearmongering. Of the more egregious examples: One RSA panel discussion about trojans, malware and targeted hacks included a slide featuring a month-old online ad for a hitman’s services. The hitman offered to “eliminate someone while keeping above suspicion??? within 30 days for $9,133. It’s still not entirely clear what this had to do with trojans, or cyberattacks, but it was scary nonetheless.
Yes, hire a hitman on the Internet.
“Professional contract killings at prices you can afford,” it reads. “Let our team of experienced contract killers make a bold statement on your behalf.”
I was thinking of thumbs-upping it myself. Only nine-ninety five, cash money to PayPal, to join.
Also on hand, the standard US government rep, in this case Ashton Carter, a man with an undistinguished career as a reliable water-bearer of concerned-sounding comment or weather vane for whichever way the winds blows in defense policy:
[Ashton Carter] expressed concern that neither governments nor the private sector are yet taking security sufficiently seriously.
“Cyber will overtake terrorism as the persistent gnawing kind of threat and danger.
He … said the [Pentagon’s] strategy would aim to defend both classified and unclassified networks, create technology using the DoD’s “weight and resources” and distribute it to law enforcement agencies.
Bonze Anne Rose Blayk said,
March 3, 2012 at 6:17 am
Dick, this is the most intriguing post you have ever made!
I’ve been mulling over hiring a hitman myself… I understand Desmond Child is available?
But he’s out of my price range!
(gumb)
Sincerely,
B.A.R.BLAYK
George Smith said,
March 3, 2012 at 9:52 am
Yeah, the Internet puts everything needed for the good life at your fingertips. Now I’m going to have to cut this short because I wanted to get in blowing up the Hoover dam before lunch.