DATE=6/10/98
TYPE=CORRESPONDENT REPORT
NUMBER=2-233679
TITLE=U-S CYBER THREAT (L ONLY)
BYLINE=JIM MALONE
DATELINE=WASHINGTON
CONTENT=
VOICED AT:
INTRO: U-S INTELLIGENCE OFFICIALS TOLD CONGRESS WEDNESDAY THAT A
SIMULATED ATTACK LAST YEAR ON GOVERNMENT COMPUTER SYSTEMS SHOWED
A GAPING HOLE IN NATIONAL SECURITY WHICH COULD BE EXPLOITED BY
HOSTILE NATIONS AND TERRORIST GROUPS. V-O-A NATIONAL
CORRESPONDENT JIM MALONE REPORTS THAT CONGRESS AND THE CLINTON
ADMINISTRATION ARE TRYING TO BEEF UP THE NATION'S CAPABILITY TO
COUNTER A CYBER-ATTACK FROM BOTH INSIDE THE COUNTRY AND ABROAD.
TEXT: IT IS A FRIGHTENING SCENARIO. WITH A FEW TAPS OF A
KEYBOARD THOUSANDS OF KILOMETERS AWAY, A SMALL BAND OF
COMPUTER-SAVVY TERRORISTS COULD CONCEIVABLY DISRUPT
COMMUNICATIONS ACROSS THE UNITED STATES.
AS THE NEW CENTURY APPROACHES, CLINTON ADMINISTRATION OFFICIALS
AND MEMBERS OF CONGRESS FROM BOTH PARTIES ARE TAKING THE THREAT
SERIOUSLY.
SENATOR JOHN KYL (REPUBLICAN-ARIZONA) CHAIRS A SENATE (JUDICIARY)
SUBCOMMITTEE ON TECHNOLOGY AND TERRORISM PROBING HOW THE UNITED
STATES CAN BETTER DEFEND ITSELF FROM CYBER-WARFARE.
/// KYL ACT ///
TODAY AN ENEMY DOES NOT NEED TO TRAVEL THOUSANDS OF
MILES TO ATTACK US. AN ENEMY DOES NOT NEED TO CARRY TONS
OF IRON BOMBS. AN ENEMY DOES NOT NEED TO RISK DETECTION
DURING THE LONG JOURNEY. TODAY, BECAUSE OF THE NETWORKED
NATURE OF OUR CRITICAL INFRASTRUCTURES, OUR ENEMIES DO
NOT NEED TO RISK ATTACKING OUR MILITARY IF THEY CAN MUCH
MORE EASILY ATTACK OUR SOFT DIGITAL UNDERBELLY.
/// END ACT. ///
THAT SOFT UNDERBELLY MAY BE MORE VULNERABLE THAN FIRST THOUGHT.
OFFICIALS OF THE NATIONAL SECURITY AGENCY TOLD CONGRESS THAT THE
RESULTS OF A SIMULATED CYBER-ATTACK AS PART OF A DEFENSE
DEPARTMENT EXERCISE LAST YEAR REVEALED SOME MAJOR FLAWS.
THE OFFICIALS SAY IT TOOK GOVERNMENT EXPERTS SEVERAL DAYS TO EVEN
REALIZE THAT VITAL COMPUTER SYSTEMS WERE UNDER ATTACK. AND IT
TOOK EVEN MORE TIME TO IDENTIFY WHERE THE ATTACKS WERE COMING
FROM. THEIR CONCLUSION WAS THAT IT WOULD ONLY TAKE A MATTER OF
DAYS BEFORE A CAREFULLY PLANNED CYBER-ASSAULT WOULD DISRUPT THE
DEFENSE DEPARTMENT'S ABILITY TO RAPIDLY DEPLOY FORCES OVERSEAS.
RICHARD CLARKE IS THE SENIOR DIRECTOR OF THE NATIONAL SECURITY
COUNCIL. HE IS WORKING WITH THE F-B-I TO DEVELOP AN EFFECTIVE
DEFENSE FOR CYBER-WARFARE.
/// CLARKE ACT ///
BY ATTACKING THE INTERCONNECTED COMPUTER NETWORKS THAT
ARE ACCESSIBLE THROUGH PUBLIC TELEPHONE LINES AND ARE
NETWORKED INTO EACH OTHER, IT COULD, AND I THINK THIS IS
MORE THAN THEORETICALLY, IT COULD BE POSSIBLE TO DISRUPT
SECTORS OF OUR BANKING INDUSTRY AND OUR FINANCE
INDUSTRY. (AND) TO CREATE WIDESPREAD AND PERSISTENT
POWER OUTAGES, TO INTERRUPT KEY TRANSPORTATION NODES
(CENTERS)--RAIL, HARBORS, AVIATION. AND IT COULD BE
POSSIBLE TO CRASH COMMUNICATIONS NETWORKS FAR MORE
DAMAGING THAN THE OUTAGE OF THE GALAXY FOUR
(COMMUNICATIONS) SATELLITE (LAST MONTH) BY THE ENTIRE
NETWORKS GOING OFF LINE AND STAYING OFF LINE.
/// END ACT. ///
SECURITY OFFICIALS SAY A PARTNERSHIP BETWEEN THE GOVERNMENT AND
PRIVATE INDUSTRY WILL BE ESSENTIAL TO DEVELOPING EFFECTIVE
DEFENSE SYSTEMS. ONE OF THE FIRST PRIORITIES IS AN IMPROVED
WARNING AND DETECTION SYSTEM SO THAT THE GOVERNMENT CAN KNOW WHEN
ITS COMMUNICATIONS INFRASTRUCTURE IS UNDER ATTACK.
LAST MONTH, PRESIDENT CLINTON ISSUED TWO POLICY DIRECTIVES AIMED
AT IMPROVING THE U-S CYBER-DEFENSE SYSTEM. ADMINISTRATION
OFFICIALS AND THE CONGRESS ARE WORKING TOGETHER ON ESTABLISHING
WHAT THEY CALL AN INITIAL CYBER-DEFENSE CAPABILITY WITHIN TWO
YEARS. (SIGNED)
NEB/JBM/JO
10-Jun-98 4:57 PM EDT (2057 UTC)
NNNN
Source: Voice of America
.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|