U.S. Is Vulnerable to Foreign Attacks, Hill Panel Is Told!

greenspun.com : LUSENET : TimeBomb 2000 (Y2000) : One Thread

Cyberwar's Economic Threat
U.S. Is Vulnerable to Foreign Attacks, Hill Panel Is Told


By Vernon Loeb
Washington Post Staff Writer
Thursday, February 24, 2000; Page A19

A leading U.S. cyberwar expert told the Joint Economic Committee yesterday that sophisticated foreign military and intelligence services represent a far greater threat to America's burgeoning Internet economy than hackers who recently launched "denial of service" attacks against commercial Web sites.

Dan Kuehl, a professor at the National Defense University, said Russian and Chinese military theorists have clearly enunciated computer attack strategies aimed at sowing fear and crippling an adversary's military and commercial information infrastructure.

"The very same means that the cybervandals used a few weeks ago could also be used on a much more massive scale at the nation-state level to generate truly damaging interruptions to the national economy and infrastructure," Kuehl testified at the hearing on cyber threats and the economy.

Quoting two Chinese military theorists as saying that future wars " 'may be conducted in a sphere not dominated by military actions,' " Kuehl said a full-fledged cyberattack has not been launched "solely because no state or non-nation state actor has yet seen sufficient strategic advantage to be gained by doing so--and this condition will not last indefinitely."

Sen. Robert F. Bennett (R-Utah), chairman of a Senate panel on Y2K-related problems who presided over the joint House-Senate hearing, noted in opening remarks that Internet transactions are projected to grow from $8 billion this year to $1.5 trillion by 2003.

Calling the U.S. government "vulnerable" to cyberattack, Bennett asked at one point, "Am I overstressing it, looking for headlines and there aren't any?" Kuehl and other cybersecurity experts said absolutely not.

Fred Cohen, a scientist at Sandia National Laboratory who is credited with inventing the computer virus as a graduate student in the mid-1980s, said hackers do not have the sophistication to successfully attack the U.S. power grid, but the Russian military and intelligence services do.

"The Russian army has sufficient intelligence, weaponry, personnel, finance and other capabilities required to do such a job," Cohen said, adding that foreign intelligence services can legally scan and probe U.S. Internet sites "and there's nothing we can do to stop these activities."

John A. Serabian Jr., a CIA information operations official, said that beyond Russian and Chinese cyberwar doctrine, U.S. intelligence is "detecting with increasing frequency the appearance and adoption of computer and Internet familiarity" in the hands of terrorist organizations.

"The skills and resources of this threat group range from the merely troublesome to dangerous," Serabian said in a submitted statement. "As we know, Middle East terrorist groups--such as Hezbollah, Hamas and Osama bin Laden's organization--are using computerized files, e-mail, and encryption to support their organizations."

Serabian said foreign cyberattackers can easily obtain technology that enables them "to conceal points of origin by hopping through several intermediate way stations in cyberspace" and then "erase cyber-footprints from victim computers."

"The foreign cyber threat constitutes a means to harm U.S. national interests in a nontraditional way using nontraditional attacks," Serabian said. "It is transnational in origin, transcends geographic limitations and is wholly independent of military intervention."

For Educational/Research Purposes Only!

© Copyright 2000 The Washington Post Company

-- Egalitarian (egalitarian@mail.com), February 24, 2000


>> Quoting two Chinese military theorists as saying that future wars " 'may be conducted in a sphere not dominated by military actions [...] <<

While I do not discount the seriousness of disruptive attacks on USA computer capacity, warfare will always be primarilly about delivery of force. Disrupting commerce is only a component of warfare, designed to degrade the enemy's ability to deliver force. Wars are won in the field by armed combatants. A whole lotta war can be waged, even if the power grid goes down. Think nuclear submarine.

-- Brian McLaughlin (brianm@ims.com), February 24, 2000.

...or even just one very aimed rocket with 10 warheads!

-- Bullseye (HitEmWhereIt@Hurts.com), February 24, 2000.

...or even just one very well aimed rocket with 10 warheads!

-- Bullseye (HitEmWhereIt@Hurts.com), February 24, 2000.

It doesn't take a whole lot of smarts to figure out that when you import unindentified black market labor to work on IT projects and then send the workers back home to wherever that the system here is vulnerable to attack. Sheesh!!! Hope those jerks that took those government contracts and set us up for this are sweating. Also hope the jerks who dispensed the contracts without monitoring are thinking about the consequences.

Too late now. Looks to me like a lot of people are trying to get a reasonable cover story together.

-- another government hack (keep_watching_2000@yahoo.com), February 24, 2000.

Moderation questions? read the FAQ