Return-Path: <sentto-279987-2840-1002729344-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 10 Oct 2001 09:00:07 -0700 (PDT) Received: (qmail 16780 invoked by uid 510); 10 Oct 2001 15:58:39 -0000 Received: from n9.groups.yahoo.com (216.115.96.59) by 204.181.12.215 with SMTP; 10 Oct 2001 15:58:39 -0000 X-eGroups-Return: sentto-279987-2840-1002729344-fc=all.net@returns.onelist.com Received: from [10.1.1.221] by n9.groups.yahoo.com with NNFMP; 10 Oct 2001 15:58:39 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 10 Oct 2001 15:55:44 -0000 Received: (qmail 16057 invoked from network); 10 Oct 2001 15:55:43 -0000 Received: from unknown (10.1.10.27) by 10.1.1.221 with QMQP; 10 Oct 2001 15:55:43 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 10 Oct 2001 15:58:40 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id IAA04580 for iwar@onelist.com; Wed, 10 Oct 2001 08:58:40 -0700 Message-Id: <200110101558.IAA04580@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 10 Oct 2001 08:58:40 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:US.names.cyber-terrorism.czar] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Wednesday, 10 October, 2001, 07:34 GMT 08:34 UK US names cyber-terrorism czar <a href="http://news.bbc.co.uk/hi/english/world/americas/newsid_1590000/1590398.stm">http://news.bbc.co.uk/hi/english/world/americas/newsid_1590000/1590398.stm> The US fears terrorists will launch cyber attacks on key infrastructure By BBC News Online's Kevin Anderson in Washington The United States has heightened security across the nation, and on Tuesday President Bush took steps to heighten security in cyberspace. A day after former Pennsylvania Governor Tom Ridge was named to the newly created post of director of the Office of Homeland Security, retired Army General Wayne Downing was appointed to serve as national director for combating terrorism and Richard Clarke was named special White House advisor for cyberspace security. For several years, Mr Clarke has been warning of the possibility of a devastating computer-based attack on the United States. Some experts are sceptical of such claims, but what they do not dispute is that both the government and the private sector need to renew their efforts to make cyberspace more secure. Electronic Pearl Harbour Richard Clarke has long been involved in counter-terrorism and cyber-security. Most recently he served as national coordinator for security, infrastructure protection and counter-terrorism on the National Security Council. Richard Clarke said the US faced a "very, very smart foe" "America built cyberspace, and now it must defend cyberspace," Mr Clarke said in accepting his new position. For years, he has been warning of what some refer to as Electronic Pearl Harbour - a computer-based attack that would cause massive amounts of destruction and loss of life. In a worst-case scenario, such an attack would target power distribution, financial services, emergency call services and air traffic control systems. "We as a country are now dependent upon information technology and the networks that we have built," Mr Clarke said in an address last year to technology executives. It is this dependence that leads some to believe that terrorists could target the computer systems and wreak havoc on the United States. And the hijackers who took part in the attacks on 11 September are believed to have used the internet to communicate, often logging on at terminals in public libraries and copy shops making their online activities difficult to track. Officials say some hackers are trying to download military and national security secrets, and the US Department of Defence computer systems have suffered from many of the same viruses that have plagued corporate and personal computer systems. Bombs still the main threat Security expert Richard Forno said "Clarke is one of the few folks in the government who has a clue about the issue" of computer security. SIDEBAR "It is much more effective to see a smoking crater where the World Trade Centre towers used to be than to see a darkened computer screen. - Computer security expert Richard Forno" Mr Forno developed the first information security programme for the US House of Representatives and served as chief information security officer for Network Solutions. He is now Chief Technology Officer for the security firm ShadowLogic. He is sceptical of the idea of such a dramatic kind of cyber-attack envisioned in Electronic Pearl Harbour scenarios. As many terrorism experts say, bombs are better than bytes. "It is much more effective to see a smoking crater where the World Trade Centre towers used to be than to see a darkened computer screen. Osama bin Laden is not going to say, 'Allah be praised, we crashed the NASDAQ'," Mr Forno said. Cyber attacks are more of a nuisance than viable terrorist tactics he says, saying that he doesn't consider someone hacking Amazon or eBay to be an act of cyber terrorism. Battle plan But he does see threats to critical computer systems, and to be effective in combating these threats, he says that Mr Clarke needs to have the authority to be effective. SIDEBAR: "My first reaction to the Office of Homeland Security is that it is a typical government reaction. It will create bureaucracy and jobs without necessarily being effective. Richard Forno" He also says that the government needs to respond to specific threats and not simply give in to knee-jerk reactions, such as the calls by some in Congress the day after the attacks to limit encryption. The government also needs to assess what types of operating systems their critical systems use and assess the security of those systems. And to create effective information security policy, he said, there should be talks with chief technology officers and systems administrators who deal with computer security on an ongoing basis. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST