from: http://abcnews.go.com/sections/tech/DailyNews/pentagon000523.html Click Here: <A HREF="http://abcnews.go.com/sections/tech/DailyNews/pentagon000523.html">ABCNE WS.com : Pentagon to Post Computer Threat…</A> ----- The Information Gauge Pentagon Initiates ‘DEF-CON’-style Warnings for Computer Threats The Pentagon has decided to post warnings when it is under an information warfare attack-- much as it would if there was a more traditional military or terrorist threat. (PhotoDisc) By Barbara Starr W A S H I N G T O N, May 23 — Following the “Love Bug” computer virus earlier this month, the Pentagon has now decided to post warnings when it is under an information warfare attack — much as it would if there was a more traditional military or terrorist threat. Throughout the Cold War, for example, the military posted “defense conditions,” more commonly referred to as “Def-Cons,” which spelled out the state of military alert. “Def-Con Normal” indicated there was no unusual activity. If tensions rose, then troops would be placed on a rising scale of alert status such as “Def-Con Alpha,” “Bravo,” “Charlie,” and “Delta.” In recent years, there has also been posting of similar “Threat-Cons,” indicating an alert for a possible terrorist attack. As “threat-cons” escalate, commanders then take increased security steps, such as checking all cars entering a base, or in an extreme instance shutting a base down to outsiders. ‘Information Conditions’ Now, the military will post “Info-Cons” or “information conditions” indicating the level of alert for a possible computer attack. The “Info-Con” warnings will be decided at the U.S. Space Command, in Colorado Springs, Colo., which has responsibility for the military’s Joint Task Force on Computer Network Defense. The concept for posting military “Information Conditions” was actually decided on before the Love Bug attack during an information warfare training exercise earlier this year. But when the Love Bug hit, military officials decided to move ahead with their plans more rapidly. The reason was that the Love Bug virus was so much more virulent and widespread than anything the military had seen before. When it swept across military computer networks around the world, individual administrators, or military commanders, all took their own actions on dealing with the problem. Some installations shut down e-mail for days, causing massive disruptions throughout the network. As a result, military computer experts decided they needed to have a central coordinating mechanism for telling installations about threats, and recommending specific network-wide actions so that solutions can be coordinated. Individual Problems This admittedly is a different approach from terrorist warnings, notes one military official. In the case of “threat conditions,” specific response actions are left up to local commanders on the belief that they know best how to deal with their installations. But the Love Bug showed that individual actions can cause cascading problems around the system. Now, in the event of another major information warfare attack, an “info-con” will be posted and commanders ordered to take a variety of actions to defend the integrity of their networks. Actions could range from rejecting e-mails from unknown addresses all the way to shutting down networks. The need to come up with “information condition” warnings after the Love Bug was further underscored because that virus was the first to penetrate classified computer systems. Officials now believe the four “infections” of classified computers were possibly the result of classified addresses being listed in unclassified address books and firewalls being breached. Officials at Space Command hope to have the final details defining “information condition” warning levels established in the next few weeks. A recent General Accounting Office report reviewing the impact of the Love Bug on the entire federal government noted the severe impact on the Defense Department. The department expended what GAO called “enormous efforts” at containing and then recovering from Love Bug. Military personnel from across the department were pulled in from their primary responsibilities. If the attack had gone on further, the department would have had to call in reservists to help, according to the report. Some DoD computers required a complete reloading of their software packages. Levels of THREAT-CONs* Classification Definition THREAT-CON NORMAL No threat of terrorist activity is present. THREAT-CON ALPHA There is a general threat of possible terrorist activity against installations, building locations, and/or personnel, the nature and extent of which are unpredictable. THREAT-CON BRAVO There is an increased and more predictable threat of terrorist activity even though no particular target has been identified. THREAT-CON CHARLIE An incident has occurred or intelligence has been received indicating that some sort of terrorist action is imminent. THREAT-CON DELTA A terrorist attack has occurred or intelligence has been received that action against a specific target is likely. *defined by U.S. military Copyright ©2000 ABC News Internet Ventures. Click here for Terms of Use and Pr ivacy Policy and Internet Safety Information applicable to this site. ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, misdirections and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html <A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om