Scott Kemp on the next arms race: cyberweapons

Scott Kemp writes about the dangers of a new arms race: cyberweaponry used for offense, not defense. Kemp, a centrifuge specialist at Princeton, points out that government agencies seeking to use cyberwarfare will most likely keep computer operating weaknesses secret from their own population, leaving everyone vulnerable. This is a very thoughtful read. Full Story »

Posted by J Sinclaire

See All Reviews »

Review

Randy Morrow
3.9
by Randy Morrow - Jun. 8, 2012

Stuxnet both failed to operate according to plan and failed to have a long-term benefit. —- However, each new cyberattack becomes a template for other nations — or sub-national actors - looking for ideas. Stuxnet revealed numerous clever solutions that are now part of a standard playbook. A Stuxnet-like attack can now be replicated by merely competent programmers, instead of requiring innovative hacker elites. -— Every vulnerability kept secret for the purpose of enabling a future cyberattack is also a decision to let that vulnerability remain open in one’s own national infrastructure, allowing it to be exploited by an enemy state or even a terrorist hacker.

Thought provoking article asking whether cyber-offense or cyber-defense is the wiser choice for a developed nation to pursue.

See All Reviews »

Randy's Rating

Overall
3.9

Good
from 11 answers
Quality
4.0
Facts
4.0
Fairness
4.0
Sourcing
3.0
Style
4.0
Context
4.0
Depth
4.0
Enterprise
4.0
Relevance
5.0
Popularity
3.5
Recommendation
4.0
Credibility
3.0
More How our ratings work »