[iwar] Tenet 2001


From: Wanja Eric Naef \(IWS\)
To: Iwar
From: w.naef@iwar.org.uk
To: iwar@yahoogroups.com

Mon, 12 Feb 2001 16:28:40 -0000


fc  Mon Feb 12 08:30:07 2001
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Mon, 12 Feb 2001 08:30:07 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Mon Feb 12 16:30:01 2001)
X-From_: w.naef@iwar.org.uk  Mon Feb 12 10:29:32 2001
Received: from mq.egroups.com (mq.egroups.com [208.50.144.79])
	by multi33.netcomi.com (8.9.3/8.9.3) with SMTP id KAA11615
	for ; Mon, 12 Feb 2001 10:29:29 -0600
X-eGroups-Return: sentto-279987-927-981995372-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by mq.egroups.com with NNFMP; 12 Feb 2001 16:29:33 -0000
X-Sender: w.naef@iwar.org.uk
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_0_3); 12 Feb 2001 16:29:31 -0000
Received: (qmail 74131 invoked from network); 12 Feb 2001 16:29:29 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 12 Feb 2001 16:29:29 -0000
Received: from unknown (HELO tungsten.btinternet.com) (194.73.73.81) by mta2 with SMTP; 12 Feb 2001 16:29:28 -0000
Received: from [213.123.141.139] (helo=vanya) by tungsten.btinternet.com with smtp (Exim 3.03 #83) id 14SLqx-0001VM-00 for iwar@yahoogroups.com; Mon, 12 Feb 2001 16:29:27 +0000
To: "Iwar" 
Message-ID: 
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200
From: "Wanja Eric Naef \(IWS\)" 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, 12 Feb 2001 16:28:40 -0000
Reply-To: iwar@yahoogroups.com
Subject: [iwar] Tenet 2001
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

It looks like it is national week of scare-mongering:

Fidel (weird that a country with virtually no Internet connections is
considered a threat, I personally consider computer literate teenagers more
as
threat than Fidel), Bin Laden, ...

CIA's Tenet on Worldwide Threat 2001 :

(Remarks by Director of Central Intelligence George J. Tenet on the
"Worldwide Threat 2001: National Security in a Changing World" (as prepared
for delivery).

IT & Terrorism

...'International terrorist networks have used the explosion in information
technology to advance their capabilities. The same technologies that allow
individual consumers in the United States to search out and buy books in
Australia or India also enable terrorists to raise money, spread their
dogma, find recruits, and plan operations far afield. Some groups are
acquiring rudimentary cyberattack tools.

Terrorist groups are actively searching the internet to acquire information
and capabilities for chemical, biological, radiological, and even nuclear
attacks. Many of the 29 officially designated terrorist organizations have
an interest in unconventional weapons, and Usama bin Ladin in 1998 even
declared their acquisition a "religious duty."'...

and Tenet on IO:

INFORMATION OPERATIONS AND SPACE

Mr. Chairman, I want to reemphasize the concerns I raised last year
about our nation's vulnerability to attacks on our critical
information infrastructure. No country in the world rivals the U.S. in
its reliance, dependence, and dominance of information systems. The
great advantage we derive from this also presents us with unique
vulnerabilities.

-- Indeed, computer-based information operations could provide our
adversaries with an asymmetric response to U.S. military superiority
by giving them the potential to degrade or circumvent our advantage in
conventional military power.

-- Attacks on our military, economic, or telecommunications
infrastructure can be launched from anywhere in the world, and they
can be used to transport the problems of a distant conflict directly
to America's heartland.

-- Likewise, our adversaries well understand U.S. strategic dependence
on access to space. Operations to disrupt, degrade, or defeat U.S.
space assets will be attractive options for those seeking to counter
U.S. strategic military superiority. Moreover, we know that foreign
countries are interested in or experimenting with a variety of
technologies that could be used to develop counterspace capabilities.

Mr. Chairman, we are in a race with technology itself. We are creating
relations with the private sector and academia to help us keep pace
with ever-changing technology. Last year I established the Information
Operations Center within CIA to bring together our best and brightest
to ensure that we had a strategy for dealing with the cyber threat.

Along with partners in the Departments of Justice, Energy, and Defense
we will work diligently to protect critical U.S. information assets.
Let me also say that we must view our space systems and capabilities
as part of the same critical infrastructure that needs protection.


Regards,

Wanja

Wanja Eric Naef

Webmaster & Principal Researcher
IWS - The Information Warfare Site
http://www.iwar.org.uk


------------------------ Yahoo! Groups Sponsor ---------------------~-~>
eGroups is now Yahoo! Groups
Click here for more details
http://click.egroups.com/1/11231/1/_/595019/_/981995372/
---------------------------------------------------------------------_->

------------------
http://all.net/