Artwork

Conteúdo fornecido por Security – Software Engineering Daily. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Security – Software Engineering Daily ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

Modern War with Peter Warren Singer

1:08:37
 
Compartilhar
 

Série arquivada ("Feed inativo " status)

When? This feed was archived on July 28, 2022 13:09 (1+ y ago). Last successful fetch was on April 07, 2022 07:18 (2y ago)

Why? Feed inativo status. Nossos servidores foram incapazes de recuperar um feed de podcast válido por um período razoável.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 194106876 series 1438211
Conteúdo fornecido por Security – Software Engineering Daily. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Security – Software Engineering Daily ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Military force is powered by software.

The drones that are used to kill suspected terrorists can identify those terrorists using the same computer vision tools that are used to identify who is in an Instagram picture. Nuclear facilities in Iran were physically disabled by the military-sponsored Stuxnet virus. National intelligence data is collected and processed using the MapReduce algorithm.

The military keeps up with technology more effectively than lawmakers. It is common to read a quote from a senator or a judge that shows a basic misunderstanding of cybersecurity. Many politicians do not even use email.

There is a large and growing knowledge gap between military capability and the technological savvy of policymakers. On the whole, government is not prepared for modern warfare.

We are lucky that military conflict in 2017 is decentralized.

There are small skirmishes in the Middle East, but there is nothing compared to the centralized hostility of World War II. The bonds of international trade form some protection against a war between major powers like US and China.

But it is easy to imagine circumstances that could lead global war. There is an arms race between the United States and China—and this arms race is happening in an environment of increasing informational chaos.
This informational chaos stretches from the highest levels of government to the least informed of our citizenry.

Online journalism is becoming physically dangerous. Journalists are being tracked and threatened. Locations where journalists live have been published by enemies of those journalists. And this war on journalists has a chilling effect on the production of truthful information.

In the war between truth and false information, the people promoting false information have a giant advantage. And that advantage is growing because we cannot identify who is a bot and who is a human.

Social media creates a fog of war around information.

There is also a fog of war around real world physical conflict that is enacted remotely through computers. This type of confusion is the problem known as cybersecurity attribution.

When a power grid gets knocked offline by a hacker, how do we know who was responsible? When a drone flies through New York City shooting at people, how do we know who deployed that drone? When self-driving car technology becomes open source, how long will it be before we see a 9/11-type event performed remotely with cars instead of an airplane—and when it does happen, how will we respond?

Imagine the level of grief and anger on 9/11 that caused our government to launch a war on Iraq. Whether or not you supported that war, we were at least (sort of) aiming in the right direction of the geographic location where the attackers came from.

What would we do if could not figure out who launched such an attack?

When cyber forensics teams look into a problem, it might appear that an attack came from China at one layer, Russia from another layer, and some domestic attacker at another layer. It can be time consuming to uncover the truth behind a cyberattack.

Just like in social media information wars, the instigators of conflict have an advantage.

And the ability to instigate such a conflict is democratized. Social media, open source software, and cloud computing give a technologist superpowers. Cryptocurrencies can anonymize the financial transactions to pay for such tools, and basic encryption can anonymize the terroristic acts that occur over a remote internet connection.

Peter Warren Singer is a political scientist who formerly worked in the United States advisory committee on International Communications and Information Policy. He is also an author, whose books include Wired for War, Cybersecurity and Cyberwar: What Everyone Needs to Know, and Ghost Fleet: A Novel of the Next World War. Peter writes about the circumstances that could lead to global warfare, and how military actors might behave in a third world war.

In this episode, Peter shares a dark, but realistic vision that we should all hope to avoid.

If you like this episode, we have done many other shows on related topics–including drones, IoT security, and automotive cybersecurity. To find these old episodes, you can download the Software Engineering Daily app for iOS and for Android. In other podcast players, you can only access the most recent 100 episodes. With these apps, we are building a new way to consume content about software engineering. They are open-sourced at github.com/softwareengineeringdaily. If you are looking for an open source project to get involved with, we would love to get your help.

The post Modern War with Peter Warren Singer appeared first on Software Engineering Daily.

  continue reading

73 episódios

Artwork
iconCompartilhar
 

Série arquivada ("Feed inativo " status)

When? This feed was archived on July 28, 2022 13:09 (1+ y ago). Last successful fetch was on April 07, 2022 07:18 (2y ago)

Why? Feed inativo status. Nossos servidores foram incapazes de recuperar um feed de podcast válido por um período razoável.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 194106876 series 1438211
Conteúdo fornecido por Security – Software Engineering Daily. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Security – Software Engineering Daily ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Military force is powered by software.

The drones that are used to kill suspected terrorists can identify those terrorists using the same computer vision tools that are used to identify who is in an Instagram picture. Nuclear facilities in Iran were physically disabled by the military-sponsored Stuxnet virus. National intelligence data is collected and processed using the MapReduce algorithm.

The military keeps up with technology more effectively than lawmakers. It is common to read a quote from a senator or a judge that shows a basic misunderstanding of cybersecurity. Many politicians do not even use email.

There is a large and growing knowledge gap between military capability and the technological savvy of policymakers. On the whole, government is not prepared for modern warfare.

We are lucky that military conflict in 2017 is decentralized.

There are small skirmishes in the Middle East, but there is nothing compared to the centralized hostility of World War II. The bonds of international trade form some protection against a war between major powers like US and China.

But it is easy to imagine circumstances that could lead global war. There is an arms race between the United States and China—and this arms race is happening in an environment of increasing informational chaos.
This informational chaos stretches from the highest levels of government to the least informed of our citizenry.

Online journalism is becoming physically dangerous. Journalists are being tracked and threatened. Locations where journalists live have been published by enemies of those journalists. And this war on journalists has a chilling effect on the production of truthful information.

In the war between truth and false information, the people promoting false information have a giant advantage. And that advantage is growing because we cannot identify who is a bot and who is a human.

Social media creates a fog of war around information.

There is also a fog of war around real world physical conflict that is enacted remotely through computers. This type of confusion is the problem known as cybersecurity attribution.

When a power grid gets knocked offline by a hacker, how do we know who was responsible? When a drone flies through New York City shooting at people, how do we know who deployed that drone? When self-driving car technology becomes open source, how long will it be before we see a 9/11-type event performed remotely with cars instead of an airplane—and when it does happen, how will we respond?

Imagine the level of grief and anger on 9/11 that caused our government to launch a war on Iraq. Whether or not you supported that war, we were at least (sort of) aiming in the right direction of the geographic location where the attackers came from.

What would we do if could not figure out who launched such an attack?

When cyber forensics teams look into a problem, it might appear that an attack came from China at one layer, Russia from another layer, and some domestic attacker at another layer. It can be time consuming to uncover the truth behind a cyberattack.

Just like in social media information wars, the instigators of conflict have an advantage.

And the ability to instigate such a conflict is democratized. Social media, open source software, and cloud computing give a technologist superpowers. Cryptocurrencies can anonymize the financial transactions to pay for such tools, and basic encryption can anonymize the terroristic acts that occur over a remote internet connection.

Peter Warren Singer is a political scientist who formerly worked in the United States advisory committee on International Communications and Information Policy. He is also an author, whose books include Wired for War, Cybersecurity and Cyberwar: What Everyone Needs to Know, and Ghost Fleet: A Novel of the Next World War. Peter writes about the circumstances that could lead to global warfare, and how military actors might behave in a third world war.

In this episode, Peter shares a dark, but realistic vision that we should all hope to avoid.

If you like this episode, we have done many other shows on related topics–including drones, IoT security, and automotive cybersecurity. To find these old episodes, you can download the Software Engineering Daily app for iOS and for Android. In other podcast players, you can only access the most recent 100 episodes. With these apps, we are building a new way to consume content about software engineering. They are open-sourced at github.com/softwareengineeringdaily. If you are looking for an open source project to get involved with, we would love to get your help.

The post Modern War with Peter Warren Singer appeared first on Software Engineering Daily.

  continue reading

73 episódios

Kaikki jaksot

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências