-Caveat Lector- <A HREF="http://www.ctrl.org/"> </A> -Cui Bono?- ------- Forwarded message follows ------- To: "'Skywatch'" <[EMAIL PROTECTED]> Date sent: Wed, 23 Feb 2000 12:44:23 -0800 From: "Dunn, Steven J." <[EMAIL PROTECTED]> Subject: [SO] CIA Says Russia, China Build Cyber Attack Abilities [ Double-click this line for list subscription options ] From: "Dunn, Steven J." <[EMAIL PROTECTED]> Wednesday February 23 2:45 PM ET CIA Says Russia, China Build Cyber Attack Abilities WASHINGTON (Reuters) - The Central Intelligence Agency said on Wednesday it was picking up growing signs that countries such as Russia and China were developing tools to attack commercial computer networks at the heart of U.S. might. ``We are detecting with increasing frequency the appearance of doctrines and dedicated offensive cyber warfare programs in other countries,'' John Serabian, the CIA's ``information operations issue manager,'' told Congress. He cited public statements by a Chinese general and a senior Russian official -- neither named in his testimony -- to illustrate what he called the importance of ``information warfare'' in coming decades. No other country was identified by name as developing such cyber weapons. But the CIA official said, ``The battle space of the information age would surely include attacks against our domestic infrastructure.'' ``Many of the countries whose cyber warfare programs we follow are the same ones that realize that, in a conventional military confrontation with the United States, they will not prevail,'' Serabian said in testimony prepared for the Joint Economic Committee. The United States itself plans to incorporate offensive computer operations into its war-fighting arsenal after policy and legal issues are sorted out, the second-ranking U.S. military officer, Air Force Gen. Richard Myers, told reporters last month. To illustrate U.S. dependence on systems and their vulnerabilities, Serabian cited the electronic blitzes that disrupted major commercial Web sites for four days starting Feb. 8. ``Whatever their motivation, the attackers have taken the threat out of the realm of the abstract and made it real,'' he said. Serabian said ``terrorists'' acting independently of any state sponsor also could do ``considerable harm'' with cyber tools, easily downloaded from the Internet, that largely erased their digital footprints while wreaking havoc online. ``Opportunities abound to disrupt military effectiveness and public safety while maintaining the elements of surprise and anonymity,'' he added. Daniel Kuehl, a professor of military strategy at the Information Resources Management College of the Pentagon's National Defense University, told the panel that cyber attacks against the United States or its allies by foreign foes were inevitable. ``Eventually, a nation state will determine that the potential gains of a strategic cyber attack on U.S. economic systems -- or those of our allies and/or neighbors -- outweigh the potential risks of such actions,'' he said. ``The time to prepare defenses against such an event is now,'' he added, citing a growing body of Russian and Chinese writings on using cyberspace to cause chaos in the economy. Fred Cohen, an information protection expert at the Energy Department's Sandia National Laboratories, testified that a well-managed U.S. intelligence network ``should be able to detect technical efforts (by a foreign foe) that could have large-scale consequences on U.S. financial systems.'' Robert Bennett, the Utah Republican who chaired a special Senate panel on the Year 2000 technology problem, said a ``new landscape'' was emerging for Congress and the nation because of the perceived mounting cyber threat. ``Attacks on American defense and industrial facilities in cyberspace are as real and dangerous as any conventional threat to economic prosperity and national security,'' said Bennett, who chaired the Joint Economic Committee hearing. ------- End of forwarded message ------- ------------------------------------------------------------------------ Steve Wingate California Director SKYWATCH INTERNATIONAL Anomalous Images and UFO Files http://www.anomalous-images.com <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are not allowed. Substance—not soap-boxing! These are sordid matters and 'conspiracy theory'—with its many half-truths, misdirections and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om