search for     
Search Sponsored by
subscribeNewslettersPortableAbout Us
News & Analysis
Special Reports
Ideas & Strategies
Media & Marketing
Money & Markets
Policy & Politics
Site Building
Tech & Telecom
Intelligence Store
Job Shop
Conferences & Events
Rooftop Party
Current Issue
Past Issues
Customer Service
My Account

Get The Daily News.
The top stories of
the Internet Economy
delivered FREE.
Sign up now!

Date Stamp tab - Editorial Wed Oct 18

The Industry Standard

February 12, 1999

World War Web

By Jackie Cohen


Microsoft Corporation (MSFT)

The Players on Gates' Team
(October 16, 2000)

Dot-Coms Hungry for the Internet Home
(October 16, 2000)

Home on the Web
(October 16, 2000)

Gadget: SportBrain Personal Fitness Assistant
(October 16, 2000)

Fiber Optics Components

IT Asset Management — Start With a Needs Analysis

Interactive Television: Is the American Market Ready?

Application Service Providers

Email to a Friend
Print Article
Write the Editor

Got a Scoop? Tip us off
The next world war could be waged on the Net.

At least that's what security pundits are saying, following President Clinton's request for $2.8 billion of the budget to go toward fighting "exotic forms of terrorism," from chemical warfare to online attacks.

Combating these menaces will "dominate national defense in the next century," Clinton said Wednesday. The requested expenditures would include hiring "computer experts who could respond quickly to electronic terrorist attacks," said Clinton.

Picture this scenario: North Korea hires 35 hackers to crack U.S. defense systems with commercially available equipment and software downloaded from the Internet. Their mission: to prevent the U.S. Air Force from flying over Korea.

Without actually breaking any countries' laws, the 35 tricksters work their way into the power grids and 911 emergency phone lines in 12 U.S. cities, and shut them down. With a similar degree of ease, the nefarious hackers then gain control of 36 computers at the Pentagon. All of this happens within four days. And army and navy generals are unable to tell that the ludicrous commands they are receiving from the warped systems are bogus.

The Pentagon recently ran a simulation of this hypothetical event, an exercise it called the Cyber Receiver, to illustrate the threat to national security. Now security activists are pointing to such examples in the wake of Clinton's commitment to fighting cyber warfare.

"We as consumers are all vulnerable to such attacks," insists James Adams, CEO of iDefense and author of The Next World War: Computers Are the Weapons and the Front Line Is Everywhere – A Study Of Information Warfare, along with 11 other treatises on such topics. Adams recently founded Infrastructure Defense, or iDefense, whose mission is to "defend the critical infrastructure from cyberspace threats."

Adams' organization is effectively a consultancy looking to cash in on a heightened level of security hysteria. Not content to use the word "hacking" to describe security breaches, Adams sounds the alarm bell with cries of "cyber terrorism." These acts can include one nation attacking another in a time of war, economic espionage, criminal theft or blackmail, or your more traditional hacking by disenchanted employees and geeks with nothing better to do on a Saturday night, according to Adams.

Alas, there is no security system strong enough to battle all of these fiends, but iDefense says it will help businesses find the right security solutions. The firm plans to build up "red teams" – squads of superhackers who will test the strength of systems that purport to be secure. This will be part of a certification methodology that iDefense will use to evaluate and guarantee the safety of company infrastructures and Web sites.

Microsoft (MSFT) has joined as a "charter member" of the organization, helping iDefense hatch its plans. IDefense is also trying to solicit Fortune 500 companies to join, at $1 million a pop, says Adams.

Companies may be willing to fork over the cash to protect themselves. "We believe it's important to protect our national security. Most of the security protecting the public is owned by the private sector," says Adam Stone, a VP at Microsoft. "We have a lot of products in installations that are required to be secure: in law enforcement, the legal profession and national security. All of the big wars in this country never happened here, but with pervasive computing, it could happen here. Let's prevent it."


Due to a reporting error, an earlier version of this story contained an incorrect figure. The cost of a charter membership with iDefense is $1 million.

Get the Magazine -- 4 Risk-Free Issues!

Today's News

Judge Patel and Napster – We Meet Again
Custom Cars Stuck in Gridlock
EBay Plans Move to TV

Get the Magazine
List Your Company
in our


Check out all our
Conferences & Events

What are your
skills worth?
Find out at

Vester Tester

Get The Magazine, Subscribe Online and Save $10!
      Featured Links
      Join Backflip: save, discover, organize, & share Web pages.
      HubStorm: Launch your net market in NO time!
      Go direct to Wall Street with Ameritrade®. Click here.
      neoIT: Outsource your software projects and launch on-time Discover Scotland’s e-commerce advantages
      Digital Island: E-Business without limits.
      Fidelity Rollover Express: Consolidate your retirement plans


ABOUT US: Media Kit | Learn About Us | Do Business With Us | Jobs | Contact Us
THE STANDARD AROUND THE WORLD: Europe | Australia | Norway | Poland | Switzerland
Copyright(c) 2000 The Standard Media International | Customer Service
Privacy Policy