Return-Path: <sentto-279987-2888-1002963208-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 13 Oct 2001 01:54:08 -0700 (PDT) Received: (qmail 14599 invoked by uid 510); 13 Oct 2001 08:53:16 -0000 Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 13 Oct 2001 08:53:16 -0000 X-eGroups-Return: sentto-279987-2888-1002963208-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by n1.groups.yahoo.com with NNFMP; 13 Oct 2001 08:53:28 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 13 Oct 2001 08:53:28 -0000 Received: (qmail 72042 invoked from network); 13 Oct 2001 08:53:28 -0000 Received: from unknown (10.1.10.26) by l10.egroups.com with QMQP; 13 Oct 2001 08:53:28 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 13 Oct 2001 08:53:28 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id BAA01304 for iwar@onelist.com; Sat, 13 Oct 2001 01:53:27 -0700 Message-Id: <200110130853.BAA01304@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 13 Oct 2001 01:53:27 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Committee.hears.sobering.news.on.Nationšs.cyber-security] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Committee on Science SHERWOOD BOEHLERT, CHAIRMAN Ralph M. Hall, Texas, Ranking Democrat www.house.gov/science October 10, 2001 Press Contacts: Heidi Mohlman Tringe (<a href="mailto:Heidi.Tringe@mail.house.gov?Subject=Re:%20(ai)%20COMMITTEE%20HEARS%20SOBERING%20NEWS%20ON%20NATIONšS CYBER-SECURITY%2526In-Reply-To=%2526lt;B7EB3E4B.18563%25rforno@infowarrior.org">Heidi.Tringe@mail.house.gov</a>) Jeff Donald (<a href="mailto:Jeffrey.Donald@mail.house.gov?Subject=Re:%20(ai)%20COMMITTEE%20HEARS%20SOBERING%20NEWS%20ON%20NATIONšS CYBER-SECURITY%2526In-Reply-To=%2526lt;B7EB3E4B.18563%25rforno@infowarrior.org">Jeffrey.Donald@mail.house.gov</a>) (202) 225-4275 Committee hears sobering news on Nationšs cyber-security WASHINGTON, DC Experts told the Science Committee today that government, industry and academia all devote too little time, and lack the human resources necessary to address a growing threat to the nationšs computer security. Among vulnerabilities pointed out by a panel of witnesses: too few cyber-security experts; no comprehensive training programs; no focal point for research; not enough innovation and creativity; and no market incentive for the private sector. They predicted dire economic consequences if the challenges facing the nationšs computer security problems are not met. ŗšWhat ifš the terrorists were also able to impact our communications system, thus hampering the rescue and recovery efforts? What if˛ power to parts of the northeast corridor could have been brought down through a cyber-attack on key systems?˛ asked Terry Benzel, Director of Network Associates labs, and a leading security researcher. ŗWe must prepare now to prevent this from happening and ensure that technologies, plans and procedures are in place to prevent and respond to any future attack.˛ ŗTo put it simply, we need more people to do be doing more creative thinking about computer security. Thatšs what our adversaries are doing,˛ said Chairman Sherwood Boehlert (R-NY). Ranking Member Ralph M. Hall (D-TX) added, ŗI believe a key to this is a vigorous and creative basic research effort focused on the security of networked information systems. Unfortunately, that is not the current state of research in this field.˛ The need for computer security specialists is part of a greater need, nationwide, for computer scientists and engineers. At least half of the PhDs granted in computer science and engineering are to foreign born students. And according to Dr. Eugene Spafford, Director of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, 23 leading institutions surveyed ŗgraduated a total of 20 PhDs in security in the last three years.˛ ŗžthe little research that is being done is focused on answering the wrong question!˛ said Dr. William Wulf, President of the National Academy of Engineering. He called for new research models that donšt rely solely on simple, passive defenses, which have always failed. All witnesses urged coordination of research and sharing of information. However, suggestions for an organizational framework were varied, from placing the responsibility in the new Office of Homeland Security to creating a new agency. Special Agent Bob Weaver, Head of the New York Crimes Electronic Task Force, stressed the importance of coordination with law enforcement to achieve success. ŗOther law enforcement agencies bring additional criminal enforcement jurisdiction and resources to the task force while representatives from private industry bring a wealth of technical expertise.˛ Weaver also provided first-hand knowledge of the need for Information Age readiness the ability to operate in a ŗvirtual environment.˛ His Task Force was located in Building 7 of the World Trade Center and within 48-hours of the complete devastation of their office, they were again operational. The Committee will hold a follow-up hearing on this issue next Wednesday, October 17th. In addition to hearings, Committee members have met with computer security experts from all relevant government agencies, the private sector, leading university research centers and law enforcement. Legislation to address cyber-security needs is currently being drafted. Committee Membersš Reaction to Hearing: Rep. Lamar S. Smith (R-TX) - ŗWars in the Information Age will be fought not just by troops on a border - mere lines on a paper map - but also by avatars in cyberspace, where there are no clear-cut lines or boundaries. We must implement measures to ensure that our information infrastructure remains strong and resistant to attack.˛ Rep. Melissa A. Hart (R-PA) - ŗProtecting the cyber infrastructure from sabotage and security risks is essential to continuing the exchange of information we enjoy with individuals throughout the world. The government and private organizations must work together to ensure that the Internet remains a forum for connecting individuals with information, while protecting it from potential cyber attacks.˛ ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST