[iwar] [fc:Avoiding.a.digital.Pearl.Harbor.]

From: Fred Cohen (fc@all.net)
Date: 2001-10-04 20:08:33


Return-Path: <sentto-279987-2700-1002251330-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 04 Oct 2001 20:11:42 -0700 (PDT)
Received: (qmail 24225 invoked by uid 510); 5 Oct 2001 03:08:54 -0000
Received: from n32.groups.yahoo.com (216.115.96.82) by 204.181.12.215 with SMTP; 5 Oct 2001 03:08:54 -0000
X-eGroups-Return: sentto-279987-2700-1002251330-fc=all.net@returns.onelist.com
Received: from [10.1.4.52] by n32.groups.yahoo.com with NNFMP; 05 Oct 2001 03:08:50 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 5 Oct 2001 03:08:50 -0000
Received: (qmail 81473 invoked from network); 5 Oct 2001 03:08:49 -0000
Received: from unknown (10.1.10.27) by m8.onelist.org with QMQP; 5 Oct 2001 03:08:49 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 5 Oct 2001 03:08:44 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA02519 for iwar@onelist.com; Thu, 4 Oct 2001 20:08:33 -0700
Message-Id: <200110050308.UAA02519@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Oct 2001 20:08:33 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Avoiding.a.digital.Pearl.Harbor.]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

04/OCT/01 USA:
Avoiding a digital Pearl Harbor.
By JOHN SCHWARTZ.
(Circuits)

In the hours of torment and confusion after the attacks on the World
Trade Center and the Pentagon, many people making phone calls to or from
the affected cities encountered the grating "All circuits are busy"
recording.  E-mail messages, however, seemed to sail through the crisis
to their destinations. 

The smooth traffic was hailed by many experts as testament to the
underlying strength of the Internet.  But hold on just one nanosecond. 
Are we talking about the Internet, referred to by so many other experts
as a famously vulnerable, fragile network that can be brought to its
knees by college students in the Philippines or a teen-ager in Canada,
with estimates of damage in the billions of dollars? It is indeed the
same Internet, ever a combination of flaky and robust. 

Fred Cohen, the computer security researcher who first applied the word
"virus" to malicious software, said that the individual elements of the
network were fragile but that the network over all was resilient.  "It's
easy to tear a piece of paper," he said.  "Try tearing a phone book in
half."

Still, David J.  Farber, a computer scientist and former chief
technologist at the Federal Communications Commission, said that the
Internet's success on Sept.  11 could largely be attributed to the fact
that "nobody attacked it."

Experts in the emerging field of cyberterrorism say that with such an
inviting target, terrorists are bound to take up the hackers' wares. 
What will happen when an attacker with real resources and a deep desire
to do harm grabs the keyboard? It may not take long to find out, and the
vulnerability may go far beyond Web sites or e-mail.  According to a
report last week by the Institute for Security Technology Studies,
founded last year at Dartmouth, "U.S.  retaliatory strikes for the
tragic Sept.  11 events may result in cyberattacks against the American
electronic infrastructure." While such attacks may amount to no more
than familiar nuisances - like hackers' defacing Web pages or tying up
sites by overwhelming them with traffic - "the potential exists for much
more devastating cyberattacks," the report said.  Those who watch trends
in computer crime and terrorism say that the two are coming together
with potentially catastrophic results.  Richard A.  Clarke, who will
head cyberterrorism efforts for the Bush administration's Homeland
Security Council, said in a speech last December that the government had
to make cybersecurity a priority or face a "digital Pearl Harbor." In
1997, the President's Commission on Critical Infrastructure Protection
noted that telephone networks and the Internet were increasingly the
bonds of the world's economy, for everything from financial operations
to the supply of water and power.  Consequently, it said, "a computer
can cause switches or valves to open and close, move funds from one
account to another, or convey a military order almost as quickly over
thousands of miles as it can from next door, and just as easily from a
terrorist hideout as from an office cubicle or military command center."
For Tom Marsh, who was the commission's chairman, the worst-case
scenarios are nightmarish: A determined coalition of hackers, he said,
could disrupt 911 service, air traffic control, the power-switching
centers that move electricity around the country, rail networks and
more.  "It's a major undertaking," said Marsh, a retired Air Force
general, "but it's not beyond the realm of possibility." The complexity
of the attacks on the World Trade Center and the Pentagon, he said,
showed that "even terrorist organizations can conduct very
well-organized and sophisticated attacks." "We said in our report we
didn't foresee an electronic Pearl Harbor, and I still don't," he said. 
"But I do believe that as cybercrime progresses, over time the
terrorists are going to get more and more interested in it and see it as
a very possible opportunity to cause major disruption." Those who have
worked in cyberintelligence say that the attention to the subject is
timely.  "Up until the 11th, people like me would talk in terms of the
growing threat of transnational attack - the prospect of new forms of
terrorism - and the basic reaction was, `Yeah, yeah, yeah, but that's
theoretical,"' said Jeffrey A.  Hunker, dean of the Heinz School of
Public Policy and Management at Carnegie Mellon University and formerly
the senior director for protection of critical infrastructure at the
National Security Council.  Since the attacks, he said, it has become
clear that "there are clearly transnational organizations that are
incredibly capable of executing sophisticated operations and are
enormously creative and innovative." "We're sitting on a cyber time
bomb," he said.  Some experts have warned, for example, that systems
accessible to the Internet like power grids could be brought down by a
determined hacker, though as Farber put it, "it's a lot easier to throw
a hand grenade down the highway south of San Jose and take out a major
power station" than to do so by modem.  Most would put cyberattacks in a
different category from the weapons of mass destruction associated with
visions of catastrophic terrorism; these are not nuclear arms, nerve gas
or germs.  Instead, many experts now call them weapons of mass
disruption.  "People aren't going to be killing us with computers,"
Hunker said, "but our life may be hell because of computer attacks." The
likeliest use of the technology, he said, would be to complicate matters
further after a real-world attack, a tactic he describes with the
military phrase "force multiplier." That could involve planting false
information on the Web to create a panic or taking down crucial
computers in the financial or communications sectors. 

The ripple effects of the World Trade Center attacks on everything from
the travel industry to supply chains in manufacturing show the potential
for havoc.  "Besides the fact of the horrendous loss of life, it was
really an attack on the critical infrastructures," said Mary J.  Culnan,
a professor of management and information technology at Bentley College
in Waltham, Mass., and a member of the presidential commission that
issued the 1997 report. 

The Clinton administration started the first major national effort to
upgrade computer security in government and business against cybercrime
and terrorist attack.  President Bill Clinton issued an order in May
1998 creating the National Infrastructure Protection Center, a
collaborative effort of law enforcement, military and intelligence
organizations to shore up defenses against computer crime.  The center
also developed an information-sharing network with major industrial
sectors.  Such activities will presumably be brought under the umbrella
of the new Homeland Defense Council that President Bush has appointed
Gov.  Tom Ridge of Pennsylvania to run.  Clarke will oversee
cyberdefense initiatives for the council as head of its Office of Cyber
Security.  Michael Vatis, the head of the Dartmouth cybersecurity group
and a former head of the National Infrastructure Protection Center, said
the stereotype of computer intruders as thrill-seeking teen-age loners
was misleading.  Talented intruders who are motivated - and perhaps
banding together with criminal or ideological motives - can go far, he
said, citing little-publicized attacks on business and Pentagon computer
networks by hackers who may be linked to organized crime in Russia.  The
attacks, beginning in 1998, are the focus of a federal investigation. 
"The type of access they were able to gain," he said, and "the amount of
information and the types of information they were getting means they
could do lots of stuff to those systems," both purloining data and
disrupting operations.  Even more dangerous than outsiders, potentially,
are insiders with specialized knowledge, according to the 1997 report of
the President's Commission on Critical Infrastructure Protection.  That
report estimated that by this year 19 million people worldwide would
have the skills to engage in malicious hacking and 1.3 million people
would have advanced knowledge of the systems that control the nation's
telecommunications infrastructure. 

A reasonably competent programmer who is willing to delve into the
arcana of computer operating systems and networks can cobble together
viruses or other destructive computer code from software posted online. 
Similarly, tools for examining computer systems for security holes and
the programs that can be used to take advantage of them to gain
unauthorized entry are also easy to find online, and members of the
worldwide community of computer vandals are happy to share their
knowledge in Internet forums. 

So what is to be done? Most of the measures that experts recommend, like
keeping up with the latest antivirus software, using strong passwords to
protect computers and networks and installing intrusion-detection
software, are painfully obvious but still ignored by many businesses,
government agencies and consumers.  The Dartmouth report also recommends
increasing protection at Web sites and keeping backups of their
important data, with special attention to the potential for Web page
defacement.  That report also recommends vigilance, and appropriate
software, to prevent or detect the surreptitious commandeering of
computer systems for use in denial-of-service attacks.  (A guide to the
best security practices can be found at
www.cert.org/security-improvement.) Informal networks for intrusion
detection are beginning to form among those who hope to find security in
numbers.  One such network, AirCert, has been developed by the CERT
Coordination Center at Carnegie Mellon's Software Engineering Institute. 
The fledgling AirCert project places Internet-based security sensors on
participating sites; those sensors automatically send data on intrusion
attempts to a central CERT knowledge base that is able to analyze the
information and share it quickly.  Mounting an effective deterrent to
cyberterror is no small task.  "It's a gigantic problem making this
work," Culnan said.  "But at least we've started thinking about it."
Copyright (c) 2001 The New York Times Company.  All rights reserved. 
Please note: Users must not download the paper in its entirety, they
must choose either a topic or keyword.  Archiving rights remain
unaltered for RBB Search, the NYT is still only available for 24 hours
on Search. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST