yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Cloud Warfare & Proactive Network Defenses
An overview of the current state of cyber warfare.

It is quickly becoming apparent that new weapon of choice for modern conflicts is not in the traditional battle field. Instead many nation-states are increasingly employing cyber warfare to attack other states or entities in an effort to disrupt or disable critical technological infrastructure. States like China and Russia, which remain inferior to the U.S. militarily, have identified the United State's cyberspace vulnerability and worked diligently to exploit it. I've had a keen facination with the military side of computing, so I thought I'd take a moment to give you an overview of the current state of Cyber warfare.

For those new to military network computing / Cyber warfare, there two main groups in the US military who are publicly devoted to Cyber warfare activities, the Air Force Cyber Command and 67th Network Warfare Wing. The stated mission of the AF Cyber Command is to develop a major command that stands alongside Air Force Space Command and Air Combat Command as the provider of forces that the President, combatant commanders and the American people can rely on for preserving the freedom of access and commerce, in air, space and now cyberspace.

Although less is known about the NSA, the National Security Agency has recently become a major player in the emerging network defenses segment of the US military. Generally speaking NSA's cyber mandate is to "help monitor" U.S. federal agency computer networks to protect them against attacks. Unofficially they have been know to proactively engage in network defenses including botnet based activities. NSA's official mission, as set forth in Executive Order 12333, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning the domestic activities of United States persons". NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the USA.

The topic of cyber warfare is not a new one, in 1996 Richard Harknett wrote a paper title "Information Warfare & Deterrence" In this famous paper, Harknett appears to be advocating for what he describes as absolute deterrence. He notes, “The essence of the Information Age is the emergence of a new form of organization. The information technology network seamlessly connects all of its parts, creating shared situational awareness throughout an organization. High connectivity supports both enhanced sustainability and greater accessibility. "

At it's heart Harknett has outlined the vision of state sponsored offensive network centric armies, both as a offensive tool but also as a form of mutual deterrence. The problem with mutual deterrence is it quickly becoming difficult to detect the friendlies from the enemies. The recent Georgian war is a perfect example. A large part of the Georgian government web infrastructure was brought down during the Russian / Georgian conflict. Although the Russian's were thought to behind the attack, the actual computers inflicting the demand were seen to be originating from civilian ISP's in the United States, in order for NATO or others combat this barrage, they would in effect have been attacking American computing targets, or "friendlies".

Harknett goes on to say "Deterrence requires that the capability to inflict retaliatory costs be perceived as reliable. Deterrence weakens to the degree that the deterrent capability can be contested by a challenger through degradation or avoidance. The inherent accessibility of information technology invites challenges to a network's connectivity. Deterrent threats relying on such connectivity will be susceptible to technical, tactical, and operational contest. The contestability of connectivity will make deterrence of information warfare difficult. "

What is most interesting is the contrast he draws between that of a Nuclear deterrent which he says "have a degree of ‘reliability of effect’ that makes the costs associated with a nuclear response seem incontestable."

Col. Charles W. Williamson III the deputy staff judge advocate at U.S. Air Forces in Europe’s military justice division recently added his own opinions. He say's "If the standard is absolute deterrence, then I admit intellectual defeat. On the other hand, if the standard is the more conventional meaning — to discourage somebody from taking action — then most of the world is deterred from symmetrical attack on the U.S. because of our conventional weapons dominance."

In a recent post Christofer Hoff added his opinions on "offensive computing";

"There's not been a war yet that has been won with defense alone, so why do we expect we can win this one by simply piling on more barbed wire when the enemy is dropping smart bombs? This is the definition of insanity and a behavior that we don't talk about changing.

"Don't spend money on AV because it's not effective" is an interesting behavioral change from the perspective of how you invest. Don't lay down and take it up the assets by only playing defense is another."

In the modern global computing environment, being a passive participant is no longer an option for most nations, if you are not taking proactive and sometimes offensive network measures you run the risk that your critical infrastructure will be exploited. This very real risk could result in real world casualties. The next big opportunity for the military contractors of the world will be in creating the next generation of distributed computing defense system, ones that can potentially take over a network of civilian compute resources both friendly or hostile. Like it or not, this is the fact we're now facing.

About Reuven Cohen
An instigator, part time provocateur, bootstrapper, amateur cloud lexicographer, and purveyor of random thoughts, 140 characters at a time.

Reuven is an early innovator in the cloud computing space as the founder of Enomaly in 2004 (Acquired by Virtustream in February 2012). Enomaly was among the first to develop a self service infrastructure as a service (IaaS) platform (ECP) circa 2005. As well as SpotCloud (2011) the first commodity style cloud computing Spot Market.

Reuven is also the co-creator of CloudCamp (100+ Cities around the Globe) CloudCamp is an unconference where early adopters of Cloud Computing technologies exchange ideas and is the largest of the ‘barcamp’ style of events.

Latest Cloud Developer Stories
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices ...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitiga...
Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams. In his session at 22nd Cloud Expo | DXWorld Expo, Daniel Jones, CTO of EngineerBetter, will answer: How can we improve wi...
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With tec...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers