Return-Path: <sentto-279987-3284-1003813353-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 22 Oct 2001 22:05:12 -0700 (PDT) Received: (qmail 28994 invoked by uid 510); 23 Oct 2001 05:02:02 -0000 Received: from n32.groups.yahoo.com (216.115.96.82) by 204.181.12.215 with SMTP; 23 Oct 2001 05:02:02 -0000 X-eGroups-Return: sentto-279987-3284-1003813353-fc=all.net@returns.onelist.com Received: from [10.1.1.224] by n32.groups.yahoo.com with NNFMP; 23 Oct 2001 05:02:33 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 23 Oct 2001 05:02:33 -0000 Received: (qmail 8239 invoked from network); 23 Oct 2001 05:02:32 -0000 Received: from unknown (10.1.10.27) by 10.1.1.224 with QMQP; 23 Oct 2001 05:02:32 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2 with SMTP; 23 Oct 2001 05:02:32 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9N52qP14728 for iwar@onelist.com; Mon, 22 Oct 2001 22:02:52 -0700 Message-Id: <200110230502.f9N52qP14728@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 22 Oct 2001 22:02:51 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Now,.Weapons.of.Mass.Disruption?] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Now, Weapons of Mass Disruption? 'Soft terrorism' would be aimed against the 'system of systems' that is modern America Newsweek, 10/22/2001 <a href="http://www.msnbc.com/news/645533.asp">http://www.msnbc.com/news/645533.asp> Oct. 29 issue - Americans have received their marching orders. They have been told to stiffen their sinews, summon up their blood-and go to the mall. And a movie. This summons to normality is akin to the rallying cry on the eve of Agincourt. However, energetic everydayness, even lightheartedness, is suddenly a serious duty. Just as there is at all times a moral obligation to be intelligent, there is today an obligation to be cheerful. IT WOULD BE irrational for Americans to begin acting as though terrorists are capable of making daily life hazardous for Americans generally. Acting that way would cripple the country's social and economic vigor, its defining assets. And an even more important reason for not allowing current problems to knock America off its normally jaunty stride is that the nation's equilibrium may soon be tested by even bigger problems. When in 1820 the argument about the admission of Missouri to the Union as a slave state aggravated sectional animosities, Jefferson called the crisis a "fire bell in the night," awakening the nation to the possibility of worse to come. Last week's fire bell was anthrax, a small sample of what can be called the terrorism of substances, biological and chemical. There have been hearings, reports and books on these subjects, but complacent democracies are educated primarily by events, not exhortations-the British did not bring Churchill to power until Hitler approached the English Channel ports. What might be the next alarm bell to ring? Of course, a truck bomb would intensify national nervousness by making things that are ubiquitous-trucks-seem ominous. And high explosives directed against, say, Hoover Dam would not only complicate life in the Southwest, it would underscore the unsettling message that even big things can be pulverized. However, it is time to think about attacks using things not solid and directed against things not as solid as skyscrapers or dams. Consider cyberterrorism, assaults that can be undertaken from anywhere on the planet against anything dependent on or directed by flows of information. Call this soft terrorism. Although it can put lives in jeopardy, it can do its silent, stealthy work without tearing flesh or pulverizing structures. It can be a weapon of mass disruption rather than mass destruction, as was explained by the President's Commission on Critical Infrastructure Protection in its 1997 report on potential cyberattacks against the "system of systems" that is modern America. "Life is good in America," the report says, "because things work. When we flip the switch, the lights come on. When we turn the tap, clean water flows." Now suppose a sudden and drastic shrinkage of life's "taken for granted" quotient. The report notes that terrorist attacks have usually been against single targets-individuals, crowds, buildings. But today's networked world of complexity and interconnectedness has vast new vulnerabilities with a radius larger than that of any imaginable bomb blast. Terrorists using computers might be able to disrupt information and communications systems and, by doing so, attack banking and financial systems, energy (electricity, oil, gas) and the systems for the physical distribution of America's economic output. Hijacked aircraft and powdered anthrax-such terrorist tools are crude and scarce compared with computers, which are everywhere and inexpensive. Wielded with sufficient cunning, they can spread the demoralizing helplessness that is terrorism's most important intended byproduct. Computers as weapons, even more than intercontinental ballistic missiles, render irrelevant the physical geography-the two broad oceans and two peaceful neighbors-that once was the basis of America's sense of safety. A threat is a capability joined with a hostile intent. In early summer 1997 the U.S. military conducted a threat-assessment exercise, code-named Eligible Receiver, to test the vulnerabilities of "borderless cyber geography." The results confirmed that in a software-driven world, an enemy need not invade the territory, or the air over the territory, of a country in order to control or damage that country's resources. The attack tools are on sale everywhere: computers, modems, software, telephones. The attacks can shut down services or deliver harmful instructions to systems. And a cyberattack may not be promptly discovered. The report says, "Computer intrusions do not announce their presence the way a bomb does." Already "subnational" groups-terrorists, organized crime-are taking advantage of legal and widely available "strong encryption" software that makes their communications invulnerable to surveillance. How invulnerable? John Keegan, the British military analyst, quotes William Crowell, former deputy director of the largest U.S. intelligence agency, the National Security Agency: "If all the personal computers in the world were put to work on a single [strongly encrypted] message, it would still take an estimated 12 million times the age of the universe to break a single message." Now suppose a state or group or state-supported group used similar cybermarvels to attack, say, U.S. banking and financial systems, or the production and distribution of electric power. Americans know how impotent, and infuriated, they feel when a thunderstorm knocks out electrical power for even a few hours. The freezer defrosts, the Palm handheld cannot be recharged, "SportsCenter" is missed. War is hell. And speaking of war: It would be interesting to know how many of the thousands of foreign students who have earned advanced degrees in computer science (and nuclear engineering, while we are at it) at American universities have come from, and returned to, the Middle East. If we are supposed to stiffen our sinews and summon up our blood for a battle, it would be well to remember that the Battle of Agincourt, for which Shakespeare's Henry V exhorted the stiffening and summoning, was won in 1415 by the skill of English archers wielding longbows, the high technology of the day. © 2001 Newsweek, Inc. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST