from:
http://abcnews.go.com/sections/tech/DailyNews/pentagon000523.html
Click Here: <A
HREF="http://abcnews.go.com/sections/tech/DailyNews/pentagon000523.html">ABCNE
WS.com :  Pentagon to Post Computer Threat…</A>
-----
The Information Gauge

Pentagon Initiates ‘DEF-CON’-style
Warnings for Computer Threats

The Pentagon has decided to post warnings when it is under an information
warfare attack-- much as it would if there was a more traditional military or
terrorist threat. (PhotoDisc)


By Barbara Starr

W A S H I N G T O N, May 23 — Following the “Love Bug” computer virus earlier
this month, the Pentagon has now decided to post warnings when it is under an
information warfare attack — much as it would if there was a more traditional
military or terrorist threat.

     Throughout the Cold War, for example, the military posted “defense
conditions,” more commonly referred to as “Def-Cons,” which spelled out the
state of military alert. “Def-Con Normal” indicated there was no unusual
activity. If tensions rose, then troops would be placed on a rising scale of
alert status such as “Def-Con Alpha,” “Bravo,” “Charlie,” and “Delta.”

     In recent years, there has also been posting of similar “Threat-Cons,”
indicating an alert for a possible terrorist attack. As “threat-cons”
escalate, commanders then take increased security steps, such as checking all
cars entering a base, or in an extreme instance shutting a base down to
outsiders.

‘Information Conditions’
Now, the military will post “Info-Cons” or “information conditions”
indicating the level of alert for a possible computer attack. The “Info-Con”
warnings will be decided at the U.S. Space Command, in Colorado Springs,
Colo., which has responsibility for the military’s Joint Task Force on
Computer Network Defense.

     The concept for posting military “Information Conditions” was actually
decided on before the Love Bug attack during an information warfare training
exercise earlier this year. But when the Love Bug hit, military officials
decided to move ahead with their plans more rapidly.

     The reason was that the Love Bug virus was so much more virulent and
widespread than anything the military had seen before. When it swept across
military computer networks around the world, individual administrators, or
military commanders, all took their own actions on dealing with the problem.
Some installations shut down e-mail for days, causing massive disruptions
throughout the network.

     As a result, military computer experts decided they needed to have a
central coordinating mechanism for telling installations about threats, and
recommending specific network-wide actions so that solutions can be
coordinated.

Individual Problems
This admittedly is a different approach from terrorist warnings, notes one
military official. In the case of “threat conditions,” specific response
actions are left up to local commanders on the belief that they know best how
to deal with their installations. But the Love Bug showed that individual
actions can cause cascading problems around the system.

     Now, in the event of another major information warfare attack, an
“info-con” will be posted and commanders ordered to take a variety of actions
to defend the integrity of their networks. Actions could range from rejecting
e-mails from unknown addresses all the way to shutting down networks.

     The need to come up with “information condition” warnings after the Love
Bug was further underscored because that virus was the first to penetrate
classified computer systems. Officials now believe the four “infections” of
classified computers were possibly the result of classified addresses being
listed in unclassified address books and firewalls being breached.

     Officials at Space Command hope to have the final details defining
“information condition” warning levels established in the next few weeks.

     A recent General Accounting Office report reviewing the impact of the
Love Bug on the entire federal government noted the severe impact on the
Defense Department. The department expended what GAO called “enormous
efforts” at containing and then recovering from Love Bug. Military personnel
from across the department were pulled in from their primary
responsibilities. If the attack had gone on further, the department would
have had to call in reservists to help, according to the report. Some DoD
computers required a complete reloading of their software packages.

Levels of THREAT-CONs*

Classification  Definition
THREAT-CON NORMAL   No threat of terrorist activity is present.


THREAT-CON ALPHA    There is a general threat of possible terrorist activity
against installations, building locations, and/or personnel, the nature and
extent of which are unpredictable.


THREAT-CON BRAVO    There is an increased and more predictable threat of
terrorist activity even though no particular target has been identified.


THREAT-CON CHARLIE
    An incident has occurred or intelligence has been received indicating
that some sort of terrorist action is imminent.


THREAT-CON DELTA
    A terrorist attack has occurred or intelligence has been received that
action against a specific target is likely.

*defined by U.S. military



Copyright ©2000 ABC News Internet Ventures. Click here for Terms of Use and Pr
ivacy Policy and Internet Safety Information applicable to this site.

-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths,
misdirections
and outright frauds—is used politically by different groups with major and
minor
effects spread throughout the spectrum of time and thought. That being said,
CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html
<A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to