Summary: In “Parsing Cyberwar – Part 3” Marcus Ranum discussed the logistical problems implicit in cyberweapons. We now have a case-study showing how quickly a new cyberweapon technology obsoletes itself. This, coupled with the tendency of one cyberweapons’ getting burned and potentially burning others in its family tree, will to tend to keep cyberweapons in the tactical domain, where they’ll be part of a churning arms-race that happens in “internet time.”
War fascinates us. Magazines, books, clubs, and a thousand websites discuss every aspect, every weapon. But most often looking backwards, because the romance and excitement of war lies in past — combat with now-obsolete weapons. In the 17th century war aficionados loved mounted knights. In 1938 tanks were boring, cavalry were prestigious. In 2000 fighter jocks were hot, uav’s were boring. Now special ops are dashing, with cyberwar discussed mostly by nerds.
This series by Marcus Ranum shows us the frontier of war (and crime), helping us prepare for the future instead of polishing myths about trendy but now only niche forms of war. You children might consider this the primary form of State-to-State war, seeing tanks and fighters only as toys on the playroom floor.
- About Gauss, new malware
- Building Gauss
- A Timeline of Quick Burn
- Pallida Narrow
- With Tweezers and Microscope
- Other chapters in the Parsing Cyberwar series
- For more information
(1) About Gauss, new malware
The latest-breaking piece of malware in the Stuxnet/Duqu/Flame saga is called “Gauss.” According to researchers at Kaspersky Labs (global IT security), it appears that all 4 of these state-sponsored pieces of malware were written by the same contractors, or by contractors who had access to a common code-base to build upon.