DATE=12/15/1999
TYPE=BACKGROUND REPORT
TITLE=MILLENNIUM: FUTUREWAR IN CYBERSPACE
NUMBER=5-45004
BYLINE=JIM RANDLE
DATELINE=PENTAGON
CONTENT=
VOICED AT:
INTRO: Top Pentagon officials say the United States
is in a virtual war in cyberspace, while experts
outside government say America is being "invaded,"
every hour of every day, by hostile forces using
computers. Many of these incidents are minor
annoyances launched by young computer hackers. Others
are launched by sophisticated nations and could cost
American lives. The irony is that this new threat
stems from the technical sophistication that helps
make the U-S military the strongest in the world.
V-O-A's Jim Randle reports.
TEXT: The Pentagon's second-in-command, John Hamre,
says U-S military computer networks are being
constantly probed by hostile computer experts who are
trying to break in and disrupt communications, steal
information, plant misinformation, or cause other
damage.
At least twice this year, Dr. Hamre has said the
United States was in the middle of a cyber war - and
the pace of attacks on U-S Military computers has
increased since then.
/// Hamre Act ///
We are in a day to day, virtual cold war. In
that sense that we have people trying to disrupt
the Department of Defense's computers on a daily
basis. So far, we are staying ahead of the
problem. But just barely.
/// END ACT ///
In an interview with V-O-A, Deputy Secretary of
Defense Hamre says the most worrisome attacks show a
level of skill likely to come only from a well-
educated, well-trained cadre of cyber soldiers
financed and supported by the government of a major
nation.
Some computer experts outside the U-S government, such
as Frank Ciffullo of the Center for Strategic and
International Studies, say the danger is real and
constant.
/// Ciffullo Act ///
The myth persists that the United States hasn't
been invaded since 1812. I'd like to inform you
otherwise. And that is the fact that invasion
through cyberspace is now a daily occurrence.
/// End Act ///
The U-S military's computers are vulnerable to probes
and break-ins because they are linked to each other by
the internet or other communications systems. The
military computers need these linkages to send masses
of information back and forth at the speed of light.
Experts say the U-S military cannot just disconnect
from the network because it needs computers to do
everything from monitoring threats from ballistic
missiles to ordering vital supplies for front line
units.
But clever attackers can use such networks to locate
critical computers. Then they use stolen passwords or
other devices to fool them into thinking that the
attacker has legitimate business inside the computer.
Pentagon officials say there are 80 to 100 attempted
computer break-ins each day and the number is growing.
About 10 such daily attacks are serious enough to
warrant investigation and a percentage turn out to be
what officials call "serious business" that threatens
lives, property, or secrets.
Many U-S officials say cyber warfare is tempting for
their adversaries because the overwhelming power of
U-S military forces makes conventional attacks
unlikely to succeed. /// Opt /// Experts say
computer warfare requires a high level of education
and skill, but the cost of a workable cyber war
program is less than the price of one first class
fighter plane. /// End Opt ///
Meanwhile, several reports blame Russia for a series
of sophisticated attacks apparently aimed at stealing
U-S Navy codes and other highly secret and sensitive
information. U-S officials refuse to say which groups
or countries are behind these attacks.
Mr. Ciffullo says attackers take advantage of the
complex, anonymous nature of cyberspace, which can
make it quite difficult to figure out where attacks
are coming from, and who is behind them, frustrating
attempts at deterrence or revenge.
/// Ciffullo Act ///
If I'm targeting the United States, I'm not
going to leave muddy footprints back to my
country, back to my site. In fact, I will
exploit innocent sites along the way, say
university systems in Stockholm and Hamburg, and
by the time you do your audit trail (try to
trace the attack), I've zapped off a long time
ago (gotten off the network).
/// End Act ///
Mr. Ciffullo says there are plenty of suspects. He
says the F-B-I is investigating at least 23 cases of
suspected computer espionage, some aimed at the
military, others directed at U-S based companies.
And he says at least eight nations, ranging from
Russia and China to Western nations such as France and
Britain, have information warfare programs comparable
to the ones being developed in the United States. He
says China is even considering making cyber warfare a
separate branch of service on a par with the Chinese
air force, army and navy.
Meantime, the U-S Air Force, Army, Navy and Marines
recently combined their efforts to defend computer
networks under the U-S Space Command headquartered in
Colorado Springs, Colorado. Each military service
also watches over its own computers.
One of the U-S Navy's cyber-sentries is Petty Officer
First Class Reed Smith, who sits with colleagues in a
large room (in Norfolk, Virginia) filled with
computers, watching for any unusual patterns in the
masses of traffic on the information highway. He is
aided by computer programs designed to seek out odd
patterns, computer databases that let him compare what
he is seeing to prior attempted break-ins - and
instinct honed by experience.
/// Smith Act ///
So much information (is) passed from network to
network that our intrusion detection devices may
pick up on something that is totally benign.
/// End Act ///
By next October, the United States will have a
military unit dedicated to launching its own attacks
in cyberspace.
America's top General, Hugh Shelton, says Washington
conducted some limited offensive cyber warfare
operations against Yugoslavia during the Kosovo
crisis. He would not say what the targets were, but
experts say the attacks focused on confusing and
blinding Yugoslav air defenses in the last 10 days of
the war. Some critics of the program called it too
timid and too late.
/// Opt /// U-S officials say they must solve some
moral and legal issues - as well as practical problems
- before cyber warfare becomes a mature part of the U-
S arsenal.
The second in command of the Pentagon's cyber war
efforts, Navy Captain Bob West, says cyber warriors
have to follow the same rules of war as any other
fighters - avoiding civilian deaths and focusing on
military targets. U-S officials have written that
using cyber attacks to hit mostly civilian areas by
opening the floodgates on a dam or causing an oil
refinery to blow up in a residential area, are out of
bounds. /// End Opt ///
Computer expert Frank Ciffullo says U-S offensive
cyber war efforts are inhibited by the realization
that the United States is the most technologically
advanced society on earth - and therefore, the most
potentially vulnerable to computer-based attacks. He
says U-S officials do not want to give their enemies a
powerful example of the effectiveness of cyber
weapons.
Meantime, computer security expert George Smith is
skeptical that offensive military operations will work
very well in cyberspace.
For years, Mr. Smith has been writing a newsletter on
computer break-ins - and how to deal with them. He
says Pentagon officials are overstating the danger
from computer hackers and intruders. /// Opt /// Mr.
Smith says computers and computer networks are
maddeningly unreliable, and computer operators and
people who depend on computers are well used to
dealing with breakdowns and delays of the sort that
might be caused by computer attackers.
Nevertheless, he expects the United States and many
other nations to try to create "cyber-attack" forces.
/// Smith Act ///
I think it is likely that people will try, I
think it is unlikely they will have any impact.
/// End Act // - End Opt ///
Mr. Smith says armies in Bosnia and the Gulf War faced
computer problems, including viruses. He says they
coped with them in much the same way they coped with
flat tires on vehicles, or worn out parts on aircraft.
He says the idea that small groups of people, armed
only with keyboards, could seriously hurt a powerful
military force belongs in Hollywood - not the
battlefield. (Signed).
NEB/JM/JP
15-Dec-1999 12:59 PM EDT (15-Dec-1999 1759 UTC)
NNNN
Source: Voice of America
.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|