building a unique programming language for online warfare, what HTML is to the web

Today, destructive cyberattacks — ones that cause servers to fry, radars to go dark, or centrifuges to spin out of control — have been assembled by relatively small teams of hackers. They’re ordered at the highest levels of government. They take months to plan. Their effects can be uncertain, despite all the preparation

the Pentagon’s top technologists have been working on a program that will make cyberwarfare relatively easy. It’s called Plan X

“Plan X is a program that is specifically working towards building the technology infrastructure that would allow cyber offense to move from the world we’re in today — where it’s a fine, handcrafted capability that requires exquisite authorities to do anything… to a future where cyber is a capability like other weapons,”

“A military operator can design and deploy a cyber effect, know what it’s going to accomplish… and take an appropriate level of action.”

In most video games, players amass bullets, gold or some other kind of resource that they then expend to help them advance through the adventure. The same principle applies to the numbers affixed to the weapons packages here. “Maybe some technologies were more expensive to develop. Maybe it’s more risky or controversial,” “Maybe we spent $5 million building X, and if we use it, there’s a 50% chance we might lose it.”  The numbers are meaningless for now; they’re just meant to convey that there’s some cost attached to every cyberattack. for example, a weapon package called Sonic Boom costs him 10 points.

every time a war plan is made in the human to machine interface, it’ll compile a custom-made software program. Then it will be error checked, and pronounced ready to deploy. Push-button cyberstrikes. The attack is planned, and ready to commence.

Portland, Oregon-based Galois, Inc. did some research into a unique programming language for online warfare — what HTML is to the web, this language might be to cyberattack.

The U.S. government, according to several published reports, is already the biggest buyer of malware that takes advantage of previously unknown computer vulnerabilities.






Explore posts in the same categories: techs

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: