[iwar] [fc:Chaos:.The.Coming.Technology.War]

From: Fred Cohen (fc@all.net)
Date: 2001-09-26 22:04:36


Return-Path: <sentto-279987-2388-1001567000-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 26 Sep 2001 22:06:08 -0700 (PDT)
Received: (qmail 32634 invoked by uid 510); 27 Sep 2001 05:04:54 -0000
Received: from n16.groups.yahoo.com (216.115.96.66) by 204.181.12.215 with SMTP; 27 Sep 2001 05:04:54 -0000
X-eGroups-Return: sentto-279987-2388-1001567000-fc=all.net@returns.onelist.com
Received: from [10.1.1.220] by mo.egroups.com with NNFMP; 27 Sep 2001 05:04:37 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 27 Sep 2001 05:03:19 -0000
Received: (qmail 95511 invoked from network); 27 Sep 2001 05:03:19 -0000
Received: from unknown (10.1.10.26) by 10.1.1.220 with QMQP; 27 Sep 2001 05:03:19 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 27 Sep 2001 05:04:36 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA02127 for iwar@onelist.com; Wed, 26 Sep 2001 22:04:36 -0700
Message-Id: <200109270504.WAA02127@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 26 Sep 2001 22:04:36 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Chaos:.The.Coming.Technology.War]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Chaos: The Coming Technology War 
Tim McDonald, Newsfactor.com, 9/26/2001
<a href="http://www.newsfactor.com/perl/story/13738.html">http://www.newsfactor.com/perl/story/13738.html>

Chances are that you won't see the next war start live on CNN, as in the
1991 Gulf War.  Nor will your early warning signal be the emergency
broadcast beep going off on your television or radio.  So how will you
know it's started? There will be some clues. 

Your pager won't work.  The movie you're watching on HBO might suddenly
go blank while the cable connection seems fine.  Or your ATM machine
will kick back your debit card for no apparent reason. 

In 1998, the Galaxy IV satellite that was orbiting the earth suddenly
malfunctioned.  About 80 percent of the pagers in the U.S.  quit
working.  Cable and broadcast video feeds also shut down, while credit
card authorization networks and other communication systems failed for
weeks. 

Space: The 'Irresistible' Target

The official explanation was that it was simply a malfunction.  But, was
it? And will it be next time? Only days after the incident, the official
Chinese news agency Xinhua ran an article that said, in part:

"For countries that could never win a war by using the methods of tanks
and planes, attacking the U.S.  space system may be an irresistible and
most tempting choice."

It wouldn't take much to disrupt and even immobilize the U.S. 
satellites upon which the country's military, government and commercial
interests are increasingly dependent.  All that would be needed is a
rocket that can reach outer space, with some aiming capability, and a
small nuclear warhead. 

China easily has such potential.  So does Russia.  And so do Iran, Iraq
and North Korea.  And, perhaps scariest of all in the current crisis, so
does Pakistan. 

A 'U.S.  Crusader' Virus?

The only thing upon which defense experts agree with respect to
information technology and its place in future conflicts is that it will
be used somehow, some way.  There are an infinite number of
possibilities. 

Computer viruses are commonplace now, though almost always relatively
unsophisticated.  They could become more specific, however, and be
directed at narrower targets. 

For example, a "PLO virus" was developed at Hebrew University in Israel. 
In Japan, hackers invaded the computerized control system for commuter
trains, disrupting major cities for hours.  Italian terrorist group the
Red Brigade specifically spells out how to take out computer systems and
installations in its manifesto. 

In Ireland, Sinn Fein supporters posted details of the British army
intelligence operations in Northern Ireland on the Internet, and they
weren't even in Ireland when they did so -- they were working from the
University of Texas at Austin. 

Electric power grids, oil and gas pipelines, vital communications
systems, sensitive data -- they're all becoming more and more
computerized and centralized. 

"Thirty years ago, terrorists could not have obtained extraordinary
leverage," said Robert Kupperman, terrorist expert and chief scientist
of the U.S.  Arms Control and Disarmament Agency.  "Today, however, the
foci of communications, production and distribution are relatively small
in number and highly vulnerable."

Kupperman made that statement in 1977. 

Air-Breathing 'Jetscrams'

What are we doing about it? The U.S.  is preparing itself with a number
of measures that range from the subtle to the spectacular.  One of the
most spectacular is NASA's Hyper-X project, featuring 12-foot-long,
unmanned, air-breathing X-43A "jetscram" aircraft launched from F-15
fighter jets that are capable of hunting down and destroying foreign
satellites that threaten ours. 

Its targets could be as small as 20-pound "nano-satellites" loaded with
sophisticated equipment and capable of jamming U.S.  satellite
transmissions with electronics or even lasers.  Pakistan is only one of
the countries working on such technology. 

There are other, less spectacular ways that could eventually be more
effective.  For example, the Federal Computer Incident Response Center
plans to revamp a system that automatically sends security patches to
civilian agencies, hoping to find a cheaper and easier way to protect
systems against malicious viruses. 

Protecting Software

On another front in the tech war, the National Science Foundation
announced this week that it will create a new research program designed
to upgrade the basic security level in commercial technology used by
government and industry. 

"It is a necessity to ensure that future information systems not only
behave as expected, but more importantly, continue to produce expected
behavior and are not susceptible to subversion," the NSF said in its
announcement. 

In addition, Georgetown University and the Terrorism Research Center
maintain an information warfare database where incidents of suspected
foreign invasions of information systems can be reported. 

"Information warfare attacks are occurring with increasing frequency and
it is vital that a dynamic resource exists to track their incidence,"
the site says. 

Who? Us?

There is also the chance you may not know about a U.S.  response to an
act of foreign electronic warfare.  A paper by the Terrorism Research
Center, headed by Matthew Devost, recommends a digital integrated
response team (DIRT). 

The idea is for the U.S.  to have its own, secret group of information
warfare terrorists, sanctioned by executive order and scattered around
the country in secret "cells."

They would constitute a kind of "digital Delta Force," the paper says --
an offensive strike force capable of inflicting chaos on an enemy's
electronic infrastructure.  Such attacks would be cloaked in anonymity
for security and other reasons. 

The paper concludes: "Such a response offers ultimate plausible denial."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:50 PDT