{"id":132,"date":"2001-10-30T09:49:39","date_gmt":"2001-10-30T17:49:39","guid":{"rendered":"http:\/\/www.kith.org\/journals\/jed\/2001\/10\/30\/132.html"},"modified":"2001-10-30T09:49:39","modified_gmt":"2001-10-30T17:49:39","slug":"semantic-attacks","status":"publish","type":"post","link":"https:\/\/www.kith.org\/jed\/2001\/10\/30\/semantic-attacks\/","title":{"rendered":"Semantic attacks"},"content":{"rendered":"\n<p>I'd heard of \"social engineering\" before; that's a form of hacking that involves breaking into computer systems by getting secure information from people who have it.  It can be done by calling up users and claiming to be a sysadmin and asking for their passwords, for example.  Hard to defend against, since such defenses require an alert and informed user base.<\/p>\n<p>But now there's something new: the notion of a \"semantic attack,\" which at base seems to consist of making a person or system believe something that isn't true.  The general approach is certainly not new; lying is a form of semantic attack.  What's new to me is the paradigm that this is an effective form of attack on a computer system.<\/p>\n<p>Martin Libicki's interesting paper \"<a href=\"http:\/\/www.ndu.edu\/inss\/actpubs\/act003\/a003cont.html\">What Is Information Warfare?<\/a>\" includes this key point in <a href=\"http:\/\/www.ndu.edu\/inss\/actpubs\/act003\/a003ch09.html\">Chapter 9<\/a>: \"A system under semantic attack operates and will be perceived as operating correctly (otherwise the semantic attack is a failure), but it will generate answers at variance with reality.\"  The rest of that chapter is interesting but not so relevant to the current reality of semantic attacks.<\/p>\n<p>And semantic attacks of a variety of forms are real.  The usual canonical example is the faux press release that caused a severe drop in the price of Emulex stock in 2000.  The recent manipulation of posted Yahoo news stories is a similar kind of semantic attack.  And in a different direction, I've been seeing a lot of URLs lately that look like they go to some site but actually go elsewhere; this <a href=\"http:\/\/www.anu.edu.au\/mail-archives\/link\/link0102\/0241.html\">Crypto-Gram posting<\/a> explains what's going on with that.<\/p>\n<p>For more on semantic attacks, see <a href=\"http:\/\/www.google.com\/search?q=semantic+attack\">Google<\/a>.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;d heard of &#8220;social engineering&#8221; before; that&#8217;s a form of hacking that involves breaking into computer systems by getting secure&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-132","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":0,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/posts\/132\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/media?parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/categories?post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kith.org\/jed\/wp-json\/wp\/v2\/tags?post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}