The Impact of War Driving on Wireless Networks

Total Page:16

File Type:pdf, Size:1020Kb

The Impact of War Driving on Wireless Networks ISSN:2231-0711 Ch.Sai Priya et al | IJCSET |June 2013 | Vol 3, Issue 6, 230-235 The Impact of War Driving On Wireless Networks Ch.Sai Priya, Syed Umar, T Sirisha Department of ECM, KL University, A.P., INDIA. Abstract — Wardriving is searching for Wi-Fi wireless WarDriving originated from wardialing, a technique networks by moving vehicle. It involves using a car or truck popularized by a character played by Matthew Broderick in and a Wi-Fi-equipped computer, such as a laptop or a PDA, to the film WarGames, and named after that film. Wardialing detect the networks. It was also known as 'WiLDing' (Wireless in this context refers to the practice of using a computer to LAN Driving).Many wardrivers use GPS devices to measure dial many phone numbers in the hopes of finding an active the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from modem. Omni directional to highly directional. Software for A WarDriver drives around an area, often after mapping a wardriving is freely available on the Internet, notably, Nets route out first, to determine all of the wireless access points tumbler for Windows, Kismet for Linux, and KisMac for in that area. Once these access points are discovered, a Macintosh. WarDriver uses a software program or Web site to map the results of his efforts. Based on these results, a Keywords — Wardriving, hacking, wireless, wifi cracking. statistical analysis is performed. This statistical analysis can be of one drive, one area, or a general overview of all 1. INTRODUCTION wireless networks During the fall of 2000,Shipley Wardriving is searching for Wi-Fi wireless networks by conducted an 18-month survey of wireless networks in moving vehicle. Wardriving was first developed by Pete Berkeley, California and reported his results at the annual Shipley in April 2001. It involves using a car or truck and a DefCon hacker conference in July of 2001.This Wi-Fi equipped computer, such as a laptop or a PDA, to presentation, designed to raise awareness of the insecurity detect the networks. Many wardrivers use GPS devices to of wireless networks that were deployed at that time, laid measure the location of the network find and log it on a the groundwork for the "true" WarDriver. website. For better range, antennas are built or bought, and vary from Omni directional to highly directional. Software 1.2 WARDRIVING MISCONCEPTIONS for wardriving is freely available on the Internet, notably, These days, you might hear people confuse the terminology NetStumbler for Windows, Kismet for Linux, and KisMac WarDriver and Hacker. As you probably know, the term for Macintosh. The gathering of statistics about wireless hacker was originally used to describe a person that was networks in a given area by listening for their publicly able to modify a computer (often in a way unintended by its available broadcast beacons is War Driving. Wireless manufacturer) to suit his or her own purposes. However, access points (APs) announce their presence at set intervals over time, owing to the confusion of the masses and (usually every 100 milliseconds) by road casting a packet consistent media abuse, the term hacker is now commonly containing their service set identifier (SSID; basically, the used to describe a criminal; someone that accesses a user-defined name of the access point) and several other computer or network without the authorization of the data items. A stumbling utility running on a portable owner. The same situation can be applied to the term computer of some sort (a laptop or PDA) listens for these WarDriver. WarDriver has been misused to describe broadcasts and records the data that the AP makes publicly someone that accesses wireless networks without available. Wireless networks have become a way of life in authorization from the owner. An individual that accesses a the past two years. As more wireless computer system, wired or wireless, without authorization Networks are deployed; the need to secure them increases. is a criminal. Criminality has nothing to do with either The activity of driving around discovering wireless access hacking or WarDriving. The news media, in an effort to points is called WarDriving. In order to successfully generate ratings and increase viewership, has WarDrive, there are some tools, both hardware and sensationalized WarDriving. Almost every local television software. Wardriving is a fun hobby that has the potential news outlet has done a story on "wireless hackers armed to make a difference in the overall security posture of with laptops" or "drive-by hackers" that are reading your e- wireless networking. mail or using your wireless network to surf the Web. These Wardriving Division Of Computer Science, SOE, CUSAT 1.1 THE ORIGIN OF WARDRIVING 3 stories are geared to propagate Fear, Uncertainty, and WarDriving is an activity that is misunderstood by many Doubt (FUD). FUD stories usually take a small risk, and people. This applies to both the general public, and to the attempt to elevate the seriousness of the situation in the news media that has reported on WarDriving. Because the minds of their audience. Stories that prey on fear are good name "WarDriving'* has an ominous sound to it, many for ratings, but don't always depict an activity accurately. people associate WarDriving with a criminal activity An unfortunate side effect of these stories has been that the Available online @ www.ijcset.net 230 Ch.Sai Priya et al | IJCSET |June 2013 | Vol 3, Issue 6, 230-235 ISSN:2231-0711 reporters invariably ask the "WarDriver" to gather 2.1 Getting the hardware: information that is being transmitted across a wireless The following sections discuss potential equipment network so that the "victim" can be shown their personal acquisitions and common configurations for each. Getting information that was collected. Again, this has nothing to the Hardware You will need some form of hardware to use do with WarDriving and while a case can be made that this with your WarDriving equipment. There are two primary activity (known as sniffing) in and of itself is not illegal, it setups that WarDrivers utilize: is at a minimum unethical and is not a practice that > The Laptop Setup WarDrivers engage in. These stories also tend to focus on > The PDA Setup gimmicky aspects of WarDriving such as the directional antenna that can be made using a Pringles can. While a functional antenna can be made from Pringles cans, coffee cans, soup cans, or pretty much anything cylindrical and hollow, the reality is that very few (if any) WarDrivers actually use these for WarDriving. Many of them have made these antennas in an attempt to both verify the original concept and improve upon it in some instances from the Underground. 1.3. THE TRUTH ABOUT WARDRIVING The reality of WarDriving is simple. Computer security professionals, hobbyists, and others are generally interested in providing information to the public about security vulnerabilities that are present with "out of the box" configurations of wireless access points. Wireless access points that can be purchased at a local electronics or computer store are not geared toward security. They are designed so that a person with little or no understanding of networking can purchase a wireless access point, and with little or no outside help, set it up and begin using it. Figure 1: WarDrving Kit Computers have become a staple of everyday life. Technology that makes using computers easier and more The Laptop Setup: fun needs to be available to everyone. Companies such as The most commonly used WarDriving setup utilizes a Linksys and DLink have been very successful at making laptop computer. To WarDrive with a laptop, you need these new technologies easy for end users to set up several pieces of hardware and at least one WarDriving Wardriving Division Of Computer Science, SOE, CUSAT software program. A successful laptop WarDriving setup 4 and begin using. To do otherwise would alienate a large includes: part of their target market. According to the FBI, it is not A laptop computer illegal to scan access points, but once a theft of service, A wireless NIC Card denial of service, or theft of information occurs, then it An external antenna becomes a federal violation. While this is good, general A pigtail to connect the external antenna to the information, any questions about the legality of a specific wireless NIC act in the United States should be posed directly to either A handheld global positioning system (GPS) unit the local FBI field office, a cyber crime attorney, or the A GPS data cable U.S. Attorney's office. This information only applies to the A WarDriving software program United States. WarDrivers are encouraged to investigate the A cigarette lighter or AC adapter power inverter local laws where they live to ensure that they aren't inadvertently violating the law. Understanding the distinction between "scanning" or identifying wireless access points and actually using the access point is understanding the difference between WarDriving, a legal activity, and theft, an obviously illegal activity. 2. HOW CAN WE GO WARDRIVING? This section will introduce you to all of the tools that are required in order to successfully WarDrive and how we can do WarDriving. There are several different configurations that can be effectively used for WarDriving, including: 1. Getting the hardware 2. Choosing a wireless network card. 3. Deciding on an external antenna 4. Connecting your antenna to your wireless NIC Figure 2. The Laptop Setup 5. Mapping the access points. Available online @ www.ijcset.net 231 Ch.Sai Priya et al | IJCSET |June 2013 | Vol 3, Issue 6, 230-235 ISSN:2231-0711 The Personal Digital Assistant (PDA) Setup: supported by WarDriving software under certain PDAs are the perfect accessory for the WarDriver because conditions.
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • PDF with Notes
    Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security auditing, and spectrum analysis. Version 1.4 by Rob, @2009-11-23 Version 1.5 by Rob, @2010-02-28 Version 1.6 by Rob, @2010-03-12 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference 2 Types of wireless tools ‣ Network ESSID scanners ‣ Wireless protocol analyzers ‣ Encryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis 3 Built-in wireless clients 4 If a computer has a wireless card, it has a basic network scanner. NetStumbler http://www.stumbler.net/ 5 NetStumbler was one of the first and most widely used WiFi detection tools. It runs only in Windows XP or Windows 2000, and works with many (but not all) wireless cards. NetStumbler can be used for mapping the coverage of your WiFi network, War Driving, rogue AP detection, aligning antennas on a long distance link, and more. NetStumbler is not open source, and was last updated in 2004. http://www.vistumbler.net/ 6 Vistumbler is an updated open source network detection tool for Windows Vista and Windows 7. It supports many of the same features as NetStumbler, including network detection and GPS integration. It also works with Google Earth to allow realtime WiFi mapping on a live map.
    [Show full text]
  • Techbeat Spring 2004
    National Law Enforcement and Corrections Technology Center Spring 2004 ore and more, when it comes to more efficient, and more cost effective, “There are probably 10 different com- agencies are inundated with these things investigating vehicle crashes, but many departments lack the expertise panies that make measuring devices and don’t necessarily know how to distance measuring tapes and to use them,” Krenning says. To help and 30 different companies that make choose which they want to use.” wheels, hand-drawn sketches, bring law enforcement agencies up to computer-aided drafting (CAD) programs M (See Scene of the Crash, page 10) and ink pens are out and computers and speed on current crash scene technolo- for law enforcement,” Mael says. “Police lasers are in. gies, NLECTC–Rocky Mountain last year “The days of going out and measur- initiated a technology assistance program ing skidmarks and using calculus to titled “Crash Scene Technologies,” which determine speed are over,” says Troy is available to law enforcement Krenning, a program manager at the agencies at no cost. National Institute of Justice’s National Last year, Krenning says, Law Enforcement and Corrections approximately 120 officers from Technology Center (NLECTC)–Rocky Colorado, Montana, and Kansas Mountain in Denver, Colorado. “These took the week-long course, a mix data are now captured in the vehicle’s of classroom presentations and black box.” hands-on exercises designed for According to William Mael, a trans- experienced crash scene investi- n a recent television commercial a portation safety consultant in Fort gators dealing with major acci- stressed-out office worker takes his laptop to a park and uses his Collins, Colorado, the technology for dents.
    [Show full text]
  • Securing Wireless Networks in Today’S Connected World, Almost Everyone Has at Least One Internet-Connected Device
    Securing Wireless Networks In today’s connected world, almost everyone has at least one internet-connected device. With the number of these devices on the rise, it is important to implement a security strategy to minimize their potential for exploitation (see Securing the Internet of Things). Internet-connected devices may be used by nefarious entities to collect personal information, steal identities, compromise financial data, and silently listen to— or watch—users. Taking a few precautions in the configuration and use of your devices can help prevent this type of activity. What are the risks to your wireless network? Whether it’s a home or business network, the risks to an unsecured wireless network are the same. Some of the risks include: Piggybacking If you fail to secure your wireless network, anyone with a wireless-enabled computer in range of your access point can use your connection. The typical indoor broadcast range of an access point is 150–300 feet. Outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could open your internet connection to many unintended users. These users may be able to conduct illegal activity, monitor and capture your web traffic, or steal personal files. Wardriving Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections available outside your home, even as far away as your street. Savvy computer users know this, and some have made a hobby out of driving through cities and neighborhoods with a wireless-equipped computer— sometimes with a powerful antenna—searching for unsecured wireless networks.
    [Show full text]
  • Downloads of Technical Information
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2018 Nuclear Spaces: Simulations of Nuclear Warfare in Film, by the Numbers, and on the Atomic Battlefield Donald J. Kinney Follow this and additional works at the DigiNole: FSU's Digital Repository. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES NUCLEAR SPACES: SIMULATIONS OF NUCLEAR WARFARE IN FILM, BY THE NUMBERS, AND ON THE ATOMIC BATTLEFIELD By DONALD J KINNEY A Dissertation submitted to the Department of History in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2018 Donald J. Kinney defended this dissertation on October 15, 2018. The members of the supervisory committee were: Ronald E. Doel Professor Directing Dissertation Joseph R. Hellweg University Representative Jonathan A. Grant Committee Member Kristine C. Harper Committee Member Guenter Kurt Piehler Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the dissertation has been approved in accordance with university requirements. ii For Morgan, Nala, Sebastian, Eliza, John, James, and Annette, who all took their turns on watch as I worked. iii ACKNOWLEDGMENTS I would like to thank the members of my committee, Kris Harper, Jonathan Grant, Kurt Piehler, and Joseph Hellweg. I would especially like to thank Ron Doel, without whom none of this would have been possible. It has been a very long road since that afternoon in Powell's City of Books, but Ron made certain that I did not despair. Thank you. iv TABLE OF CONTENTS Abstract..............................................................................................................................................................vii 1.
    [Show full text]
  • Server / Drone / Client Infrastructure[Edit] Kismet for Mac Keyboard
    Kismet For Mac Developer(s) Mike Kershaw (dragorn) Stable release 2020-04-R3[1] / May 2, 2020; 5 months ago Repository Written in C++ Operating system Cross-platform Type Packet Sniffer License GPL Website www.kismetwireless.net 1. Kismet For Mac Keyboard 2. Kismet For Mac Download 3. Kismet For Mac Os 4. Kismet For Mac Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. The client can also run on Microsoft Windows, although, aside from external drones (see below), there's only one supported wireless hardware available as packet source. Distributed under the GNU General Public License,[2] Kismet is free software. Features[edit] Traditional Lipsticks, Liquid Lipsticks, Matte Lipsticks, Lip Plumping Glosses, Lip Liners and More! Showing 1–21 of 70 results. Rated 5.00 out of 5. CEO Semi-Matte Lipstick $ 18.00 Add to cart. Yours Truly Semi-Matte Lipstick $ 18.00 Add to cart. Sweetie Semi- Matte Lipstick. Two files stored in the /etc/kismet directory called 'apmanuf' and 'clientmanuf' are used to help Kismet determine the types and manufacturers of AP or wireless clients based on MAC. KisMAC is an open-source and free sniffer/scanner application for Mac OS X. It has an advantage over MacStumbler / iStumbler / NetStumbler in that it uses monitor mode and passive scanning. Kismet differs from other wireless network detectors in working passively.
    [Show full text]
  • I Am the Antenna: Accurate Outdoor AP Location Using Smartphones
    I Am the Antenna: Accurate Outdoor AP Location using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and Haitao Zheng† †Department of Computer Science, UC Santa Barbara, CA 93106, USA §School of Electronic and Information Engineering, Xian Jiaotong University, P. R. China {zengbin, xiazhou, yuanyang, gangw, ravenben, htzheng}@cs.ucsb.edu, [email protected] ABSTRACT 1. INTRODUCTION Today’s WiFi access points (APs) are ubiquitous, and pro- WiFi networks today are ubiquitous in our daily lives. vide critical connectivity for a wide range of mobile network- WiFi access points (APs) extend the reach of wired networks ing devices. Many management tasks, e.g. optimizing AP in indoor environments such as homes and offices, and en- placement and detecting rogue APs, require a user to effi- able mobile connectivity in outdoor environments such as ciently determine the location of wireless APs. Unlike prior sports stadiums, parks, schools and shopping centers [1, 2]. localization techniques that require either specialized equip- Even cellular service providers are relying on outdoor WiFi ment or extensive outdoor measurements, we propose a way APs to offload their 3G traffic [2, 3]. As Internet users be- to locate APs in real-time using commodity smartphones. come reliant on these APs to connect their smartphones, Our insight is that by rotating a wireless receiver (smart- tablets and laptops, the availability and performance of to- phone) around a signal-blocking obstacle (the user’s body), morrow’s networks will depend on well tuned and managed we can effectively emulate the sensitivity and functionality access points.
    [Show full text]
  • Paper: Wardialing Brief
    Wardialing Brief Kingpin @Stake, Inc. 196 Broadway, Cambridge, MA 02139, USA. http://www.atstake.com E-mail: [email protected] Abstract. Wardialing consists of using a computer to dial a given set of telephone numbers with a modem. Each phone number that answers with modem handshake tones and is successfully connected to is stored in a log. By searching a range of phone numbers for computers, one can find entry points into unprotected systems and backdoors into seemingly secure systems. This brief introduces the wardialing concept, examines concerns with today's network setups, and lists free and commercial software products, whitepapers, news reports, and Internet resources. Keywords: wardialing, telephony, security, modem 1 Introduction to Wardialing Wardialing, or scanning, has been a common activity in the computer underground and computer serucity industry for decades. Hollywood made wardialing popular with the 1983 movie, WarGames, in which a teenager searching for a videogame company ultimately uncovers a government nuclear war warning system [1]. Seventeen years after the mainstream was made aware of wardialing activity, the problem of unprotected dial-up systems still exists in the majority of corporations. The act of wardialing is extremely simple – a host computer dials a given range of telephone numbers using a modem. Every telephone number that answers with a modem and successfully connects to the host is stored in a log. At the conclusion of the scan, the log is reviewed and the phone numbers are individually dialed with a computer. The user then attempts to identify the systems, and, depending on the goals of the wardial, attempts system access.
    [Show full text]
  • Wargames Ovvero: Come Applicare La Logica Del Paradosso E Vincere Una Guerra Impossibile
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Institutional Research Information System University of Turin WarGames Ovvero: come applicare la logica del paradosso e vincere una guerra impossibile “WarGames” è un film del 1983, noto in italiano anche con il sottotitolo di “Giochi di guerra”. Al di là della scarsa fantasia mostrata nella traduzione, non si può certo negare che tanto i “giochi” quanto la “guerra” siano i due elementi centrali attorno ai quali ruota l‟intera vicenda narrata nella pellicola. Il film, nonostante la sua scorrevolezza, è generalmente corretto nel presentare elementi di carattere tecnico e militare – se si eccettua qualche piccolo errore1 – e fornisce validi spunti degni di approfondimento. L‟intento di questo breve saggio consiste nell‟evidenziare alcuni aspetti che si pongono in relazione diretta con la realtà strategica della Guerra fredda, vista soprattutto dal lato statunitense. A questo verranno aggiunte anche alcune osservazioni su caratteristiche emergenti, che solo oggi hanno acquisito il vigore e la visibilità che negli anni ‟80 erano ancora in massima parte ipotetici, ma relativamente alle quali la pellicola fornisce già qualche intuizione. Ma al di là e – oserei dire – al di sopra di tutto questo, l‟elemento probabilmente più interessante consiste nella logica del paradosso che permea il film, e che di per se stessa costituisce il tassello fondante del confronto nucleare dell‟epoca bipolare. Il paradosso è stato presentato, in via più generale, come una caratteristica chiave sottesa ad una corretta concezione strategica2, e tale enfasi diviene ancora più evidente in un contesto quale quello atomico. Un ottimo pregio di “WarGames” è il cogliere questo spirito, e proprio in omaggio a tale virtù, non sottrarremo l‟applicazione della medesima logica al film stesso, ottenendone così spesso un ribaltamento di prospettiva che forse può essere utile per fare un po‟ di luce nel contesto strategico-militare di quel periodo.
    [Show full text]
  • Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
    Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies.
    [Show full text]
  • History of Wargames
    History of Wargames: Toward a History Based Doctrine for Wargaming as of 6 Jan 2000 By Matthew Caffrey Send comments to [email protected] - A Congressman with a national reputation as a defense expert opposes the President's plan for military action because of the casualty levels predicted by war games. - One weapons program is canceled and another accelerated, both largely due to the results of war games. - An air component commander convinces an area CinC to change the deployment plan of a major regional plan due to problems anticipated through a war game. Our expectations of the future shape that future. Those who concern themselves with the future of warfare develop their expectations in many ways, from the study of history to the building of complex mathematical models, to the integration of both these approaches using the medium of wargaming. Without question war games shape those expectations, hence they help shape the future. Ever more powerful computers appear to promise ever better war games. Yet is the Emperor really wearing clothes? Or to use a more contemporary expression, isn't the validity of "garbage in garbage out" independent of computing power? Will war games lead or mislead us in the future? As several historians have observed, "I know of no guide to the future but the past." For almost 200 years modern war games have been providing life saving insights and fatal mirages. If these different outcomes were random there would little use in studying that history. However, as the Caffrey Cycle illustrates, history provides the raw material for anticipating cause and effect.
    [Show full text]
  • Ready Player One by Ernest Cline
    Ready Player One by Ernest Cline Chapter 1 Everyone my age remembers where they were and what they were doing when they first heard about the contest. I was sitting in my hideout watching cartoons when the news bulletin broke in on my video feed, announcing that James Halliday had died during the night. I’d heard of Halliday, of course. Everyone had. He was the videogame designer responsible for creating the OASIS, a massively multiplayer online game that had gradually evolved into the globally networked virtual reality most of humanity now used on a daily basis. The unprecedented success of the OASIS had made Halliday one of the wealthiest people in the world. At first, I couldn’t understand why the media was making such a big deal of the billionaire’s death. After all, the people of Planet Earth had other concerns. The ongoing energy crisis. Catastrophic climate change. Widespread famine, poverty, and disease. Half a dozen wars. You know: “dogs and cats living together … mass hysteria!” Normally, the newsfeeds didn’t interrupt everyone’s interactive sitcoms and soap operas unless something really major had happened. Like the outbreak of some new killer virus, or another major city vanishing in a mushroom cloud. Big stuff like that. As famous as he was, Halliday’s death should have warranted only a brief segment on the evening news, so the unwashed masses could shake their heads in envy when the newscasters announced the obscenely large amount of money that would be doled out to the rich man’s heirs. 2 But that was the rub.
    [Show full text]