[iwar] [fc:Sen..Wyden.Proposes.Technology.Defense.Force]

From: Fred Cohen (fc@all.net)
Date: 2001-09-27 15:44:08


Return-Path: <sentto-279987-2461-1001630649-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 27 Sep 2001 15:45:08 -0700 (PDT)
Received: (qmail 480 invoked by uid 510); 27 Sep 2001 22:44:25 -0000
Received: from n28.groups.yahoo.com (216.115.96.78) by 204.181.12.215 with SMTP; 27 Sep 2001 22:44:25 -0000
X-eGroups-Return: sentto-279987-2461-1001630649-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by f19.egroups.com with NNFMP; 27 Sep 2001 22:44:09 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 27 Sep 2001 22:44:09 -0000
Received: (qmail 10952 invoked from network); 27 Sep 2001 22:44:08 -0000
Received: from unknown (10.1.10.142) by 10.1.4.52 with QMQP; 27 Sep 2001 22:44:08 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 27 Sep 2001 22:44:08 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id PAA22687 for iwar@onelist.com; Thu, 27 Sep 2001 15:44:08 -0700
Message-Id: <200109272244.PAA22687@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 27 Sep 2001 15:44:08 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Sen..Wyden.Proposes.Technology.Defense.Force]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Sen. Wyden Proposes Technology Defense Force 
By Robert MacMillan, Newsbytes, 9/27/2001
<a href="http://www.newsbytes.com/news/01/170581.html">http://www.newsbytes.com/news/01/170581.html>

Sen.  Ron Wyden, D-Ore., Wednesday proposed the formation of a "National
Emergency Technology Guard" that would function as a National
Guard-style information-technology defense force, comprising the
nation's technology workers, in the event of a national crisis.  While
he has not proposed legislation, Wyden intends to meet next week with
representatives from several technology companies, and also has planned
hearings in the Senate Commerce Subcommittee on Science, Technology and
Space, which he chairs.  The list of representatives has not yet been
issued. 

Wyden in a floor speech on Wednesday said that U.S.  IT companies could
organize a "national volunteer response team" to protect the U.S. 
communications infrastructure "in times of critical need." The so-called
NET Guard would use computer equipment, satellite dishes, wireless
communications devices and other methods to "quickly recreate and repair
compromised communications and technology infrastructures." "With
congressional support, the leaders of our nation's technology companies
could organize themselves, their employees, and their resources for this
purpose," Wyden said.  "Medium- and small-sized businesses would be able
to contribute once a national framework was put in place."

Wyden added that federal funding "need not be extensive." He also said
that he would encourage a dialogue between IT companies and
congressional, military and non-profit leaders to probe the value of a
NET Guard. 

Wyden's interest in such a program comes after reports surfaced that
satellite telephones, such as those operating on Globalstar's and
Iridium's networks, functioned when cellular and other mobile
communications devices were knocked out following the Sept.  11
terrorist attacks on the World Trade Center and the Pentagon. 

"Our phones basically work virtually anywhere, whereas terrestrial-based
systems like cell phones only work within the limited radius of cellular
transmission towers," Globalstar spokesman Mac Jeffreys told Newsbytes
earlier this week.  "If something happens to those towers, that's it." A
House subcommittee chairman at a Wednesday hearing also highlighted the
continued vulnerability of federal government IT systems to worm, virus
and other kinds of cracking attacks. 

Rep.  Stephen Horn, R-Calif., chairman of the House Government Reform
Subcommittee on Government Efficiency, Financial Management and
Information Technology, said that the defenders of the critical IT
infrastructure must learn from the Sept.  11 terrorist attacks that the
"government's critical computer systems are as vulnerable to attack as
airport security."

Newsbytes Staff Writer Dick Kelsey contributed to this report. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:51 PDT