-Caveat Lector-

from:
http://www.gcn.com/vol18_no27/news/440-1.html
<A HREF="http://www.gcn.com/vol18_no27/news/440-1.html">DOD set to fight
hackers both foreign and domes </A>
-----
<National jurisdictions are blurred in cyberspace, Frank said>
-----

August 23, 1999


DOD set to fight hackers both foreign and domestic


Task force monitors network to give department another layer of
protection against cyberterrorism

By William Jackson
GCN Staff

When the Defense Department’s Joint Task Force on Computer Network
Defense opened for business last December, it found plenty to do.

“We have been at cyberwar for the last half-year,’’ deputy Defense
secretary John Hamre said. “At least we had a place to work on it.’’

Hamre spoke at ceremonies this month to mark the task force’s coming to
full strength in June. Since then, an interservice staff—supported by
the DOD Computer Emergency Response Team, an intelligence cell and law
enforcement liaisons—has been monitoring the Defense Information
Infrastructure around the clock. The task force works out of the Global
Network Operations and Security Center at Defense Information Systems
Agency headquarters in Arlington, Va.

So far, none of the cyberthreats has proved serious. But Hamre said
DOD’s primary mission is to prepare for the next battle, “buying the
infrastructure in advance that we know we are going to need at some
time.’’

Hamre has testified to Congress about the threat of what he called an
electronic Pearl Harbor—an attack on the nation’s information
infrastructure. He said he was referring not to a devastating surprise
attack but rather to military preparedness.

“It wasn’t that we got hit, but that we were ready to respond,’’ Hamre
said.

The Global Network Operations and Security Center at DISA headquarters
is the task force’s nerve center.

Warning signs

Until recently, DOD has not been ready to respond to a full-scale
electronic attack. Air Force Maj. Gen. John Campbell, DISA vice director
and task force commander, said the network defense unit grew out of the
Eligible Receiver 97 exercise in 1997, in which National Security Agency
teams waltzed into DOD systems using off-the-Internet hacking tools.

No one was then in charge of defending DOD networks, and it showed,
Campbell said. Awareness was reinforced by the monthlong Solar Sunrise
assault on DOD systems by a pair of teen-agers last year.

Today, “we are really serious about protecting our networks and our
systems,’’ Campbell said.

Although the task force is physically at DISA headquarters,
organizationally it is part of the Space Command, reporting to the
commander-in-chief at Peterson Air Force Base, Colo. The task force uses
DISA’s global network management capability to monitor and analyze
problems on DOD systems and coordinate responses.

“We don’t fix the computers; we look at the operational side,’’ said
Army Col. Larry Frank, chief of operations. “The other thing we bring to
the table is command authority.’’ DISA has no authority over any of the
services.

The task force this spring encountered the Melissa computer virus, which
spread rapidly by e-mail and threatened to swamp some DOD systems. The
virus struck on a Friday, giving a two-day weekend buffer. The Defense
CERT responded with a patch to block the virus within 12 hours.

DISA’s director, Lt. Gen. David J. Kelley, left, Defense CIO Arthur
Money, DOD’s John Hamre and DISA’s Maj. Gen. John W. Campbell were on
hand for the ceremony.

“We were lucky it wasn’t very damaging,’’ Frank said.

The task force was aware of hacks against DOD Web sites during the air
war in Kosovo, but they were not operationally significant, Frank said,
because DOD does not rely on the Web to carry out its missions.

“We don’t get real worried about Web page hacks,’’ he said. “That’s an
appearance issue.’’

The task force has a judge advocate on staff liaison officers from DOD
criminal investigative agencies.

It also maintains a working relationship with the FBI and other law
enforcement agencies. Most attacks come from the outside, Frank said,
and dealing with them is a law enforcement issue.

An attack from beyond U.S. borders might become an intelligence issue.

National jurisdictions are blurred in cyberspace, Frank said.



------------------------------------------------------------------------


News | Technology Report | Product Reviews | Enterprise Computing |
Communications | DOD Computing | Product Preference Survey | Webworks |
GCN Interview | Editorial | Letters to the Editor | Opinion |
Professional Calendar | The Community | Buyers Guide | GCN Lab |
Archives | Upcoming Editorial State & Local Government Computer News |
GCN Shopper | Source Guide | Govt Windows NT TM
Search | Subscribe Free | Events | Ad Info | Lab | Contact GCN | FAQ |
Links/Portal

Copyright (c) Post-Newsweek Business Information, Inc. All rights
reserved.
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
Omnia Bona Bonis,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to