[iwar] Government Tests Cyberattack Defenses/Security Experts Concerned About Cyber-Terrorism/Sandia Labs studies phony computer network for hackers

From: Ralph Wasmer <rwasmer@swbell.net>
Date: Sat Nov 29 2003 - 23:45:00 PST

Government Tests Cyberattack Defenses
Posted Wednesday, November 26, 2003 - 3:33pm by
<mailto:kirkhope@terrorism.com>kirkhope
The Homeland Security Department's first simulation of a terrorist attack
on computer, banking and utility systems exposed problems with the ways
victimized industries communicated vital information during the crisis, the
government's new cybersecurity chief said Monday. Experts inside government
and the Institute for Security Technology Studies at Dartmouth College are
still formally evaluating results of the so-called "Livewire" exercise,
carried out over five days late in October. It simulated physical and
computer attacks on banks, power companies and the oil and gas industry,
among others. "There were some gaps," said Amit Yoran, the newly hired
chief of the agency's National Cyber-Security Division. "The information
flow between various sectors was not as smooth as we would perhaps have
liked." He assessed government's performance as "certainly a B+, better
than my personal expectations."
<http://www.washingtonpost.com/wp-dyn/articles/A12667-2003Nov25.html>Ful! l
Story

Security Experts Concerned About Cyber-Terrorism
Posted Wednesday, November 26, 2003 - 3:40pm by
<mailto:kirkhope@terrorism.com>kirkhope
Security analysts who specialize in tracking terrorist groups like al-Qaida
are expressing increasing concern that such organizations may use
cyber-terrorism as a way to launch attacks inside the United States and
other countries. They warn that computers can be used to severely damage
critical infrastructure and have the potential to cause widespread
bloodshed. Security specialists say the United States and many other
countries are now exposed to a host of terrorist threats from cyberspace,
as the world's most developed nations increasingly rely on millions of
computer networks and the Internet to run critical infrastructure. A study
released earlier this year by the White House says the primary concern is
the danger of organized cyber attacks that could have devastating
consequences for a wide variety of human and economic targets. Wayne Crews
is the director of technology policy at the CATO Institute, a non-profit
public-policy research foundation based in Washington.
<http://www.iwar.org.uk/news-archive/2003/11-20-8.htm>Full Story

Sandia Labs studies phony computer network for hackers
Posted Tuesday, November 25, 2003 - 1:50pm by
<mailto:kirkhope@terrorism.com>kirkhope
Instead of merely fending off thousands of daily computer attacks, federal
researchers are trying a new tack: Create a meaningless digital universe to
bog down hackers and study their tactics. It's called a "honeynet," and
while the idea isn't exactly new, branches of the U.S. defense community
are starting to embrace the idea. "If I can detect and delay someone until
I can get a (law-enforcement) response to where they are, then I don't need
to build four-foot-thick bunkers to keep them out," said Barry V. Hess,
co-manager of cybersecurity for Sandia National Laboratories.
Network-security experts at Sandia's California campus in Livermore are
experimenting with such a mirage this week in Phoenix.
<http://www.oaklandtribune.com/Stories/0,1413,82~1865~1776530,00.html>Full
Story

"Never Mistake Motion for Action"
Ernest Hemingway (1899-1961)

[Non-text portions of this message have been removed]

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Buy Ink Cartridges or Refill Kits for your HP, Epson, Canon or Lexmark
Printer at MyInks.com. Free s/h on orders $50 or more to the US & Canada.
http://www.c1tracking.com/l.asp?cid=5511
http://us.click.yahoo.com/mOAaAA/3exGAA/qnsNAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Received on Sat Nov 29 19:44:09 2003

This archive was generated by hypermail 2.1.8 : Fri Dec 05 2003 - 14:25:47 PST