Return-Path: <sentto-279987-3838-1005442990-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 10 Nov 2001 17:44:07 -0800 (PST) Received: (qmail 4498 invoked by uid 510); 11 Nov 2001 01:42:06 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by all.net with SMTP; 11 Nov 2001 01:42:06 -0000 X-eGroups-Return: sentto-279987-3838-1005442990-fc=all.net@returns.groups.yahoo.com Received: from [10.1.4.52] by n35.groups.yahoo.com with NNFMP; 11 Nov 2001 01:43:10 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 11 Nov 2001 01:43:09 -0000 Received: (qmail 76824 invoked from network); 11 Nov 2001 01:43:09 -0000 Received: from unknown (216.115.97.167) by m8.grp.snv.yahoo.com with QMQP; 11 Nov 2001 01:43:09 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 11 Nov 2001 01:43:10 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAB1hYM03099 for iwar@onelist.com; Sat, 10 Nov 2001 17:43:34 -0800 Message-Id: <200111110143.fAB1hYM03099@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 10 Nov 2001 17:43:34 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:U.S..builds.up.cyberwar.arsenal] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit U.S. builds up cyberwar arsenal Reuters, 11/9/2001 <a href="http://news.cnet.com/news/0-1003-200-7816387.html?tag=owv">http://news.cnet.com/news/0-1003-200-7816387.html?tag=owv> WASHINGTON -- Even as it fights in Afghanistan with bombs and guns and allies on horseback, the U.S. military is gearing up to use computers and code as potentially decisive weapons in the next phases of its campaign. The goal would be to disable air defense systems, scramble enemy logistics and perhaps infect software through tactics being honed by a joint task force set up in 1999 under the Colorado Springs, Colo.-based U.S. Space Command. If Afghanistan were home to anything but one of the world's least computer-reliant societies, U.S. forces might have kicked off the campaign they began Oct. 7 with keyboard-launched strikes to disrupt the Taliban militia's command and control. But a cyberblitz would have had scant impact on Afghanistan, one of only a handful of nations that never even bothered to touch base with a United Nations network that prepped governments for feared Year 2000 computer disruptions. "They're just not connected," said information security strategist Bruce McConnell, who tried unsuccessfully to include the Taliban in the International Y2K Cooperation Center he headed under U.N. aegis. In addition, since the start of the U.S.-led campaign against Afghan protectors of terror suspect Osama bin Laden, "we've seen absolutely no indication of terrorists attacking via cyberspace," Space Command spokesman Army Maj. Barry Venable said. The U.S. military has been working on tools that could wreak electronic havoc on countries accused of harboring terrorists as well as on ways of defending global networks against cyberattack. "Transformation cannot wait," Defense Secretary Donald Rumsfeld said last week, using military jargon for souping up U.S. forces to meet 21st-century threats and to cash in on high-tech covert capabilities. "We must act now to prepare for the next war, even as we wage the current war against terrorism," he wrote in a Nov. 1 The Washington Post guest column. After the Sept. 11 blitz that turned civilian airliners into missiles, killing some 4,800 people, the United States must plan for new and different foes who will rely on "surprise, deception and asymmetric weapons," or those meant to overcome the lopsided U.S. edge in conventional arms, Rumsfeld said. "To deal with those future surprises, we must move rapidly now to improve our ability to protect U.S. information systems and ensure persistent surveillance, tracking and rapid engagement of an adversary's forces and capabilities," he said. The Defense Department has been readying to make cyberblitzes on enemy computer networks a standard tool of war, Air Force Gen. Richard Myers, now Chairman of the Joint Chiefs of Staff, said earlier this year as he left the Space Command. Army Gen. Henry Shelton, Myers' predecessor as the top U.S. military officer, confirmed that the United States had jabbed electronically into Serbian computer networks throughout the 78-day NATO bombing campaign over Kosovo in 1999. Unspecified hostile countries have probed U.S. computer networks for ways to spark mayhem in wartime, Richard Clarke, the White House National Security Council staff coordinator for security, infrastructure protection and counter-terrorism, said in June. "This is not theoretical. It's real," Clarke said at the time. He was tapped by President Bush on Oct. 16 to head a new senior advisory board on critical infrastructure protection--in other words, the country's vital communications, transportation, food and health care systems. CIA and Pentagon war games already feature foes using bits and bytes, not bombs or ballistic missiles, to attack U.S. financial institutions, communications hubs and spy satellites. Guerrilla forces are bound to turn to cyberweapons to wage their battles in an increasingly networked future, just as political activists have used denial-of-service attacks and Web page defacements to amplify their messages. "As we harden our bridges, airports and other infrastructure, terrorists are going to seek the path of least resistance," said Steven Roberts, a computer security expert at Georgetown University. "That means they're likely to embrace information warfare tools such as viruses, Trojan Horses and password crackers." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Universal Inkjet Refill Kit $29.95 Refill any ink cartridge for less! Includes black and color ink. http://us.click.yahoo.com/r9F0cB/MkNDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST