[iwar] [fc:Committee.hears.sobering.news.on.Nationšs.cyber-security]

From: Fred Cohen (fc@all.net)
Date: 2001-10-13 01:53:27


Return-Path: <sentto-279987-2888-1002963208-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 13 Oct 2001 01:54:08 -0700 (PDT)
Received: (qmail 14599 invoked by uid 510); 13 Oct 2001 08:53:16 -0000
Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 13 Oct 2001 08:53:16 -0000
X-eGroups-Return: sentto-279987-2888-1002963208-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by n1.groups.yahoo.com with NNFMP; 13 Oct 2001 08:53:28 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 13 Oct 2001 08:53:28 -0000
Received: (qmail 72042 invoked from network); 13 Oct 2001 08:53:28 -0000
Received: from unknown (10.1.10.26) by l10.egroups.com with QMQP; 13 Oct 2001 08:53:28 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 13 Oct 2001 08:53:28 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id BAA01304 for iwar@onelist.com; Sat, 13 Oct 2001 01:53:27 -0700
Message-Id: <200110130853.BAA01304@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 13 Oct 2001 01:53:27 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Committee.hears.sobering.news.on.Nationšs.cyber-security]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Committee on Science

SHERWOOD BOEHLERT, CHAIRMAN

Ralph M. Hall, Texas, Ranking Democrat

www.house.gov/science

 

October 10, 2001         

Press Contacts:

Heidi Mohlman Tringe (<a href="mailto:Heidi.Tringe@mail.house.gov?Subject=Re:%20(ai)%20COMMITTEE%20HEARS%20SOBERING%20NEWS%20ON%20NATIONšS	CYBER-SECURITY%2526In-Reply-To=%2526lt;B7EB3E4B.18563%25rforno@infowarrior.org">Heidi.Tringe@mail.house.gov</a>)

Jeff Donald (<a href="mailto:Jeffrey.Donald@mail.house.gov?Subject=Re:%20(ai)%20COMMITTEE%20HEARS%20SOBERING%20NEWS%20ON%20NATIONšS	CYBER-SECURITY%2526In-Reply-To=%2526lt;B7EB3E4B.18563%25rforno@infowarrior.org">Jeffrey.Donald@mail.house.gov</a>)

(202) 225-4275

 

Committee hears sobering news on Nationšs cyber-security

WASHINGTON, DC ­ Experts told the Science Committee today that
government, industry and academia all devote too little time, and lack
the human resources necessary to address a growing threat to the
nationšs computer security.  Among vulnerabilities pointed out by a
panel of witnesses:  too few cyber-security experts; no comprehensive
training programs; no focal point for research; not enough innovation
and creativity; and no market incentive for the private sector.  They
predicted dire economic consequences if the challenges facing the
nationšs computer security problems are not met. 

ŗšWhat ifš the terrorists were also able to impact our communications
system, thus hampering the rescue and recovery efforts?  ŒWhat if˛ power to
parts of the northeast corridor could have been brought down through a
cyber-attack on key systems?˛ asked Terry Benzel, Director of Network
Associates labs, and a leading security researcher.  ŗWe must prepare now to
prevent this from happening and ensure that technologies, plans and
procedures are in place to prevent and respond to any future attack.˛

 

ŗTo put it simply, we need more people to do be doing more creative thinking
about computer security.  Thatšs what our adversaries are doing,˛ said
Chairman Sherwood Boehlert (R-NY). 

 

Ranking Member Ralph M. Hall (D-TX) added, ŗI believe a key to this is a
vigorous and creative basic research effort focused on the security of
networked information systems.  Unfortunately, that is not the current state
of research in this field.˛

 

The need for computer security specialists is part of a greater need,
nationwide, for computer scientists and engineers.  At least half of the
PhDs granted in computer science and engineering are to foreign born
students.  And according to Dr. Eugene Spafford, Director of the Center for
Education and Research in Information Assurance and Security (CERIAS) at
Purdue University, 23 leading institutions surveyed ŗgraduated a total of 20
PhDs in security in the last three years.˛

 

ŗžthe little research that is being done is focused on answering the wrong
question!˛ said Dr. William Wulf, President of the National Academy of
Engineering.  He called for new research models that donšt rely solely on
simple, passive defenses, which have always failed.

 

All witnesses urged coordination of research and sharing of information. 
However, suggestions for an organizational framework were varied, from
placing the responsibility in the new Office of Homeland Security to
creating a new agency. 

 

Special Agent Bob Weaver, Head of the New York Crimes Electronic Task Force,
stressed the importance of coordination with law enforcement to achieve
success.  ŗOther law enforcement agencies bring additional criminal
enforcement jurisdiction and resources to the task force while
representatives from private industry bring a wealth of technical
expertise.˛  Weaver also provided first-hand knowledge of the need for
Information Age readiness ­ the ability to operate in a ŗvirtual
environment.˛  His Task Force was located in Building 7 of the World Trade
Center and within 48-hours of the complete devastation of their office, they
were again operational. 

 

The Committee will hold a follow-up hearing on this issue next Wednesday,
October 17th.  In addition to hearings, Committee members have met with
computer security experts from all relevant government agencies, the private
sector, leading university research centers and law enforcement. 
Legislation to address cyber-security needs is currently being drafted. 

 

Committee Membersš Reaction to Hearing:

 

Rep. Lamar S. Smith (R-TX) - ŗWars in the Information Age will be fought not
just by troops on a border - mere lines on a paper map - but also by avatars
in cyberspace, where there are no clear-cut lines or boundaries.  We must
implement measures to ensure that our information infrastructure remains
strong and resistant to attack.˛ 

 

Rep. Melissa A. Hart (R-PA) - ŗProtecting the cyber infrastructure from
sabotage and security risks is essential to continuing the exchange of
information we enjoy with individuals throughout the world.  The government
and private organizations must work together to ensure that the Internet
remains a forum for connecting individuals with information, while
protecting it from potential cyber attacks.˛

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST