We expect them to be good. We didn't expect so many to survive.
But, survive they did. And now they're helping increase that big database of their own, the manual on fighting asymmetric warfare. And I'd bet Bush knows they aren't going to stay long in Iraq.
Here's what we should look out for, from 2000.
The "Love Bug Virus Attacks," Asymmetric Warfare; Future National Security Implications... by C. L. Staten, CEO and Sr. Analyst
Emergency Response & Research Institute (ERRI)
ERRI DAILY INTELLIGENCE REPORT-ERRI Risk Assessment Services
Monday, July 10, 2000 Vol. 6, No. 192
"Only civil virtue can bring peace to an empire; only martial virtue
can quell disorder in the land. The expert in using the military has
three basic strategies that he applies: the best strategy is to attack
the enemies reliance on acuteness of mind; the second is to attack the
enemies claim that he is waging a just war; and the the last is to
attack the enemies battle positions." -- Sun-Tzu, The Art of Warfare
(1)
Has anyone noticed that the only thing that spread more rapidly than
the so-called "Love Bug Virus" was the proliferation of commentary
about it. In fact, the talk dominated many forums for several days
after the virus was first discovered. Given this level of interest
that was demonstrated and the estimated BILLIONS of dollars of damage
that was been done by this virus...one has to wonder what the
intelligence and defense community of the United States is doing about
taking a pro-active stance to protect our vital infrastructures??
Although costly to corporate America, it would appear that we as a
country, have again "dodged the bullet" of major damage to our
military and intelligence C4I networks. That may be due to the fact
that most of the known attacks so far have targeted commercial,
business or other internet-related organizations. But, the attacks
that have taken place so far beg a question that must be asked at this
juncture: What is going to happen when a concerted effort is
undertaken by experts to use denial of service attacks (2), in concert
with viruses, root-cracking, and other computer-based infrastructure
attacks to attack the defense/intelligence establishment of our
country and her security alliances throughout the world??
We see each of these recent sets of attacks as a potential "test of
effectiveness" trial. As previously discussed by this author and a
number of our other esteemed colleagues (Wilson and Fuller, Denning,
Forno, Schwartau, Toffler, etc.)(3)(4)(5)(6) one has to wonder when we
are going to take these examples of 4th Generation/Asymmetric warfare
seriously enough to make them a formal and more integral part of our
future defense preparedness and planning. Each wave of these attacks
continues to demonstrate a new and more evolved capability on the part
of our adversaries.
Given a natural evolution of these tactics and the stated intent of
some our transnational enemies, We must suggest that serious
consideration be given at the highest levels of the U.S. and allied
governments to the possibility that these tactics may be COMBINED with
the use of a series of conventional terrorist attacks -- or worse yet
-- unconventional weapons (WMD's), to cause a vastly disproportionate
effect on the both the economy of the USA and the overall psyche' of
the world.(3) In light of these circumstances, it would appear that we
may be quickly coming to a critical juncture in the way we respond to
these threats and ultimately defend our country.
CONTINUED...
http://seclists.org/lists/isn/2000/Jul/0068.html Should've listened.