User talk:Energyconsultant7

Cybertoge is an act of cyber sabotage carried out against physical equipment. Through cybertoge, an attacker can degrade, disrupt or destroy equipment used in critical industries, such as electrical power, transportation or manufacturing.

The term cybertoge was coined by John Bumgarner, Chief Technology Officer for the U.S. Cyber Consequences Unit (US-CCU) and a Senior Research Fellow in International Security Studies at the Fletcher School of Law and Diplomacy of Tufts University at a presentation given at the National Defense Industrial Association Cyber Symposium in San Diego. He also discussed various cybertoge attacks in his 2010 article “Computers as Weapons of War.”

A notable demonstration of what could be accomplished by cybertoge was the Idaho National Laboratory project known by the code name "Aurora." During this demonstration, an electric generator was physically destroyed by a cyber attack that manipulated the generator’s automated controls.

Another much discussed example of cybertoge is the alleged 1982 Siberian pipeline incident in which control software was supposedly modified to produce a major pipeline explosion.

Some of the hypothetical cybertoge attacks outlined by Bumgarner included: the intentional insertion of malicious code (e.g., logic bombs) into military equipment, such as main battle tanks, satellite communication architecture, and UAV battlefield surveillance systems, which contain sophisticated electronic components.

For instance, the F-35 Joint Strike Fighter used advance communication and computer technology, which could possibly be seeded with malicious code during the fabrication process, programming stage or maintenance cycle. One of the possible cybertoge attack vectors could be the pilot's helmet-mounted display system (HMDS), which is used to display and select aerial targets. An intentional insertion of malicious code into the HDMS could severely impede the air-to-air combat operations of the infected aircraft.

Another example is the Russian T-95 main battle tank, which is laden with advanced electronic components that could be targeted by cybertoge. Malicious code could be inserted into the tank’s information systems, disabling the targeting systems or the internal power plant during battlefield operations.

References:

•	http://www.carlisle.army.mil/dime/documents/IOJournalVol2Issue2May2010final.pdf •	http://news.cnet.com/8301-27080_3-10436144-245.html

Energyconsultant7 (talk) 18:38, 9 July 2010 (UTC)