At the Washington Post, Ellen Nakashima has a story this evening
about a list of cyber-weapons and tools (for instance, malware with which to attack an enemy state's infrastructure networks) for computer warfare. The list of capabilities is classified, and has been in use for several months. Other US agencies, including the CIA, have approved it, and the list is now of the Pentagon's set of weapons or "fires" approved for use against an adversary. Snip:
List of cyber-weapons developed by Pentagon to streamline computer warfare (WaPo)
"So whether it's a tank, an M-16 or a computer virus, it's going to follow the same rules so that we can understand how to employ it, when you can use it, when you can't, what you can and can't use," a senior military official said.
The integration of cyber-technologies into a formal structure of approved capabilities is perhaps the most significant operational development in military cyber-doctrine in years, the senior military official said.
The framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later. The military does not need such approval, however, to penetrate foreign networks for a variety of other activities. These include studying the cyber-capabilities of adversaries or examining how power plants or other networks operate. Military cyber-warriors can also, without presidential authorization, leave beacons to mark spots for later targeting by viruses, the official said.
California assemblyman Jim Cooper (D-9th) has copy-pasted New York assemblyman Matthew Titone’s (D-61st) insane, reality-denying bill that bans companies from selling smartphones with working crypto on them, introducing nearly identical measures in the California legislature.
Trumpscript — a python variant — only allows numbers over 1,000,000; has no import statements (all declarations must be homegrown); only has integers because floating-point numbers are un-American (America never does anything halfway); only allows popular words and the names of politicians as variable names; limits error messages to direct Trump quotes; and requires that […]
“Radical ecology” has come to mean a kind of left-wing back-to-the-landism that throws off consumer culture and mass production for a pastoral low-tech lifestyle. But as the brilliant science journalist and Marxist Leigh Phillips writes in Austerity Ecology & the Collapse-Porn Addicts: A Defence Of Growth, Progress, Industry And Stuff, if the left has a future, it has to reclaim its Promethean commitment to elevating every human being to a condition of luxurious, material abundance and leisure through technological progress.
You’ve heard the news: cyber security is the new and very scary frontier. Hackers are out there just waiting for you to relax for a second and let them in. But that’s not going to happen to you. With a lifetime premium subscription to ZenMate VPN, you’re completely protected from anyone out there who wants […]
Remember back to the time when people thought java was just a hip way to talk about coffee? Or you vaguely remembered from geography class that it’s an island in the South Pacific? We’ve come a long way since then and now that we’ve rocket blasted into the tech future, you’re going to need to […]
Plastic is so 2013. You don’t want to buy something only to throw it away or lose it and barely care. You like nice things and want to hang onto them. The Plazmatic lighter here is a high quality, high tech alternative to the typical cheap, plastic lighter you get at the old gas station. […]