[iwar] [fc:Visions.become.real;.cyberwar,.other.terrorist.threats]

From: Fred Cohen (fc@all.net)
Date: 2001-10-02 20:17:22


Return-Path: <sentto-279987-2634-1002079043-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 02 Oct 2001 20:19:12 -0700 (PDT)
Received: (qmail 30030 invoked by uid 510); 3 Oct 2001 03:17:29 -0000
Received: from n9.groups.yahoo.com (216.115.96.59) by 204.181.12.215 with SMTP; 3 Oct 2001 03:17:29 -0000
X-eGroups-Return: sentto-279987-2634-1002079043-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by n9.groups.yahoo.com with NNFMP; 03 Oct 2001 03:17:23 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 3 Oct 2001 03:17:23 -0000
Received: (qmail 42130 invoked from network); 3 Oct 2001 03:17:23 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 3 Oct 2001 03:17:23 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 3 Oct 2001 03:17:22 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10676 for iwar@onelist.com; Tue, 2 Oct 2001 20:17:22 -0700
Message-Id: <200110030317.UAA10676@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 2 Oct 2001 20:17:22 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Visions.become.real;.cyberwar,.other.terrorist.threats]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Visions become real; cyberwar, other terrorist threats 
Government Computer News, 10/2/2001
www.gcn.com

Cyberwarfare.  Global information grid.  Networked sensors.  Joint
interoperability.  Situational awareness. 

Such words and many others like them, used to describe the information
environment in which post-Cold War conflicts will be fought, are no
longer abstractions.  Events on Sept.  11 have catapulted the carefully
pictured conflict with an imagined new type of enemy out of the realm of
potential and into the real. 

Suddenly, U.S.  military forces are engaged against that type of enemy
which has long been envisioned in a million Microsoft PowerPoint
presentations, mission statements, simulations, war game exercises and
budget requests.  This enemy and the terrain on which it will be fought
are radically different from the conventional armies and navies of
nations--a fact that Defense Department planners have long expected and,
to a lesser degree, prepared for. 

Using airliners to cause physical destruction has certain, if
horrifying, analogies to computer hacking such as network
denial-of-service attacks.  Both use the target's own infrastructure and
equipment against it.  Both require training, planning and knowledge. 
It's fair to assume that, having achieved property destruction of nearly
biblical dimensions, the perpetrators will attempt something equally big
against information systems.  This time, the goal won't be to put funny
slogans or pictures on home pages, but to wipe out systems.  Indeed, the
World Trade Center was a major communications hub in addition to a
financial center and Western symbol. 

MILITARY SYSTEMS FACE two challenges as they support the forces that
will be thrown against the enemy.  They must deliver the functionality
promised.  And they must be hardened against attack.  Vendors are also
on notice.  They must take their product claims and contractual clauses
not merely as legal obligations but as sacred trusts. 

Support for the warfighter--the phrase no longer has the glib, slogan
quality it did two weeks ago.  We hope and pray--and have faith--that
the information systems and those building and operating them are up to
the task, now that plans and simulations have given way to powder, iron
and blood. 

Thomas R. Temin 
Editorial director

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST