[iwar] [fc:Lawmaker.Sounds.Warning.Note.On.Computer.Security]

From: Fred Cohen (fc@all.net)
Date: 2001-09-26 22:19:22


Return-Path: <sentto-279987-2400-1001567964-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 26 Sep 2001 22:21:10 -0700 (PDT)
Received: (qmail 938 invoked by uid 510); 27 Sep 2001 05:19:40 -0000
Received: from n2.groups.yahoo.com (216.115.96.52) by 204.181.12.215 with SMTP; 27 Sep 2001 05:19:40 -0000
X-eGroups-Return: sentto-279987-2400-1001567964-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hi.egroups.com with NNFMP; 27 Sep 2001 05:19:24 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 27 Sep 2001 05:19:24 -0000
Received: (qmail 61747 invoked from network); 27 Sep 2001 05:19:23 -0000
Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 27 Sep 2001 05:19:23 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 27 Sep 2001 05:19:23 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA02677 for iwar@onelist.com; Wed, 26 Sep 2001 22:19:22 -0700
Message-Id: <200109270519.WAA02677@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 26 Sep 2001 22:19:22 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Lawmaker.Sounds.Warning.Note.On.Computer.Security]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Lawmaker Sounds Warning Note On Computer Security 
By Robert MacMillan, Newsbytes, 9/26/2001
<a href="http://www.newsbytes.com/news/01/170512.html">http://www.newsbytes.com/news/01/170512.html>

The recent terrorist attacks on the World Trade Center and the Pentagon
presage the potential of severe cyber-sorties on the nation's and
government's critical IT infrastructures, and now is not the time for
Congress to delay in doing their part to fabricate a strong online
defense, an influential House subcommittee chairman today said.  Rep. 
Stephen Horn, R-Calif., chairman of the House Government Reform
Subcommittee on Government Efficiency, Financial Management and
Information Technology, said in a hearing on IT security that the
defenders of the critical IT infrastructure must learn from the Sept. 
11 terrorist attacks.  They must realize, he said, that the
"government's critical computer systems are as vulnerable to attack as
airport security."

Horn also said that the General Accounting Office (GAO) in 1997 added
government computer security to its high-risk list, but "it is now 2001,
and the government has made little progress in addressing computer
security issues."

The Sept.  11 terrorist attacks notwithstanding, Horn also said recent
computer worm and virus issues highlight the ongoing need to protect
critical computer systems. 

"Following the terrorist attacks on New York and Washington, the 'Nimda'
worm attacked computer systems around the world," Horn said.  "On
Monday, a new worm was unleashed on computer systems.  This worm is
capable of wiping out a computer's basic system files.  These attacks
are increasing in intensity, sophistication and potential damage."

Horn long has been an advocate of increased cyber-security for
government computer systems.  Last September he released a "report card"
for federal government cyber-security, giving the government an
"appalling average grade of D-minus."

The Clinton administration's National Security Council cyber-security
point man, Richard Clarke, agreed with Horn that computer security
needed drastic improvement. 

Several private groups, including Gartner Inc., have urged the Bush
administration to appoint a federal chief information officer to field a
range of IT issues, including privacy, electronic government, Internet
voting and cyber-security. 

Rep.  Jim Turner, D-Texas, has sponsored legislation to create a federal
CIO position, as have Sens.  Joseph Lieberman, D-Conn., and Conrad
Burns, R-Mont.  White House Office of Management and Budget Deputy
Director Sean O'Keefe in July told a Senate hearing, however, that a
federal CIO would create a new and unnecessary government bureaucracy. 

The Bush administration supports using the OMB deputy director of
management as a cyber-security chief. 

Reported by Newsbytes.com, <a
href="http://www.newsbytes.com">http://www.newsbytes.com> . 


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:50 PDT