SNS: Resisting Chaos

 

STRATEGIC NEWS SERVICE®

 

Weekly Report on

Technology and the Economy

 

16 Years Providing Weekly Foresight

 

The most accurate predictive letter in computing and telecommunications,
read by industry leaders worldwide.

 

SNS Subscriber Edition Volume 16, Issue 5 Week of February 4, 2013

 

***SNS***

Resisting Chaos

 

 

 

In This Issue

 

 

Feature:

Resisting Chaos

 

The Biological View

The Internet View

The Financial View

The Military View

The Media View

The Grid Perspective

The Network View

Resisting Chaos

 

Quotes of the Week

 

Takeout Window

 

The NYT and WSJ

Get Hacked by the Chinese

Anonymous at Work

The Latest Google-Related Hack

Apple's Slip

One of the Phones That's

Beating Apple in China

Apple in China

 

Ethermail

 

In Case You Missed It...

Members Making News

 

Upcoming SNS Events

& Media Links

 

In Other House News...

 

New Members' Welcome

How to Subscribe

May I Share This Newsletter?

About SNS

About the Publisher

Where's Mark?

 

[Please open the .pdf attachment for best viewing.]

 

___

 

 

   "...On a different topic, I think you might find this newsletter interesting. Mark Anderson is the guy behind it. He is wicked smart and always seems to find an insightful, often different, way to look at the technology and policy opportunities/challenges facing us. The community of readers is equally interesting.

Anyway, enjoy this latest copy of SNS. If you like it, I think you might enjoy subscribing."

 

- Tom Malloy, CTO of Adobe, in an email referral to a colleague; this week.

 

___

 

 

If you'd like to be more involved in SNS events as one of our select partners or sponsors, please contact Sharon at: sam@stratnews.com or 435-649-3645.

 

 

 

 

 

 

 

 

Resisting Chaos

 

Although work on the Stuxnet Virus Attack was begun under President George W.  Bush, it was launched against Iran under President Obama. My understanding is that, prior to this launch, there was a legal review, parts of which are just now being made public, which examined when such pre-emptive cyber attacks would be interpreted to be legal under US and international law.

 

The decision out of the executive branch appears to have been that the attack should only occur if it could be constrained to the physical target of the Natanz nuclear facility in Iran. At the time of its launch, it immediately became the most successful military offensive cyber attack in (non-classified public) history.

 

Of course, today there are variations of Stuxnet floating around by the millions of copies, being modified by - well, who knows, or for who knows what uses?