Return-Path: <sentto-279987-4780-1023461916-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 07 Jun 2002 08:03:07 -0700 (PDT) Received: (qmail 31790 invoked by uid 510); 7 Jun 2002 14:58:58 -0000 Received: from n23.grp.scd.yahoo.com (66.218.66.79) by all.net with SMTP; 7 Jun 2002 14:58:58 -0000 X-eGroups-Return: sentto-279987-4780-1023461916-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.192] by n23.grp.scd.yahoo.com with NNFMP; 07 Jun 2002 14:58:36 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 7 Jun 2002 14:58:36 -0000 Received: (qmail 37930 invoked from network); 7 Jun 2002 14:58:35 -0000 Received: from unknown (66.218.66.217) by m10.grp.scd.yahoo.com with QMQP; 7 Jun 2002 14:58:35 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 7 Jun 2002 14:58:35 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g57F1fP08806 for iwar@onelist.com; Fri, 7 Jun 2002 08:01:41 -0700 Message-Id: <200206071501.g57F1fP08806@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 7 Jun 2002 08:01:41 -0700 (PDT) Subject: [iwar] [fc:Cyberspace.Seen.Area.Of.'Great.Threat.And.Great.Danger'] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Aerospace Daily June 7, 2002 Cyberspace Seen Area Of 'Great Threat And Great Danger' COLORADO SPRINGS, Colo. - U.S. Space Command expects an increase this year in the number of attempts by hackers to break into Defense Department computer networks, according to Lt. Gen. Ed Anderson, deputy commander in chief. One of the command's responsibilities is to meet all of the department's current and future cyber threats and requirements, and Anderson said the importance of the task can't be overemphasized. "As a matter of fact," he said June 5 at a Chamber of Commerce luncheon here, "I will tell you that if there's anything that keeps me awake at night, more than the any of the other things we do, it's cyberspace. That truly is an area of great threat and great danger." From 1998 to 1999, he said, "there was a five-fold increase in the number of events that we detected in terms of trying to get into our unclassified" networks. Since then, "there has been a steady increase in the number of events that have been detected ... and I can assure you" that the number for 2002 will be greater than the number for 2001. Last year, Anderson said, "close to 30,000" events were detected, and "We expect over 40,000 events this year in our unclassified nets." In the period immediately after Sept. 11, he said, "we were very concerned for cyber terrorism. We didn't know what was going to happen." As North American Aerospace Defense Command dramatically increased the number of jets on alert, U.S. Space Command, working with other government agencies and industry, boosted surveillance of DOD computer networks to 24 hours a day, seven days a week. "And interestingly enough," Anderson said, "what we found is that the number of events went down - way down." This, he said, was "attributable to a number of different things" including the fact that "nobody wanted to draw attention to themselves at that particular time because the nation was a little bit mad. If they saw something like that they'd find the whole darn country coming down on top of them." But "as we started looking into this more closely," with the understanding that "the al Qaeda depends upon cyber for command, control and communications," it became apparent that "they did not want to draw attention to their capabilities [in this area], so they, of course, took a hide position." In earlier remarks, Anderson said there should "be no doubt that [al Qaeda] are leveraging information age technology as they conduct this war. This is not an unsophisticated enemy." At a May 22 conference at Peterson Air Force Base here, an Army Special Forces officer made similar comments. "The indigenous forces that we worked with [in Afghanistan], as well as the Taliban and al Qaeda, have both satellite cell phone capability and satellite communications capability," said Capt. "Dean," whose last name can't be used for security reasons. "Specifically, we've seen Taliban and al Qaeda - even as low-tech of an organization and culture as they are, they understand that we, being the United States and our coalition, understand that when they use their cell phones, we're listening," he said. "We saw them begin to develop tactics, techniques and procedures where they would move to isolated areas to conduct their communication linkups, knowing that we would intercept those linkups in that location, and probably respond ... not only do they have the technologies but they're also aware of our technologies and counter them, and they have developed procedures to counter our responses." At the luncheon, Anderson cited the use of videotapes by Osama bin Laden, and said, "they know that information is a powerful weapon, and it enables them to sway public opinion." -- Rich Tuttle ------------------------ Yahoo! Groups Sponsor ---------------------~--> Save 30% on Web addresses! Get with the times, get a web site. Share information, pictures, your hobby, or start a business. Great names are still available- get yours before someone else does! http://us.click.yahoo.com/UBc4BA/nFGEAA/Zr0HAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT