-Caveat Lector- http://www.newscientist.com/dailynews/news.jsp?id=ns9999922 New Scientist June 25, 2001 Smart bomb Future electronic warfare will be carried out by intelligent software agents, says CIA intelligence officer Future electronic warfare will be carried out by intelligent software agents rather than computer hackers, according to one CIA intelligence officer. Lawrence Gershwin, a CIA national intelligence officer, told a US Congress Joint Economic Committee that increasing computer power could change the nature of information warfare in coming years. In particular, it could make programs designed to mimic human intelligence a common weapon of enemies of the state. "Either side could apply research in autonomous software 'agents'. [These are] intelligent, mobile and self-replicating software intended to roam a network gathering data or to reconnoitre other computer network operations." Software programs capable of independently performing basic tasks are already common. They are often used to search for information but are sometimes employed by computer hackers to attack other computers. In May, for example, a computer worm called sadmind/IIS was designed to automatically deface web pages after spreading between victims' computers. Gershwin said that more intelligent agents may be developed by both the US and its enemies to automate computer network attack and defence. John Daughman of Cambridge University's computer science department says that virtual agents will be just one of many new weapons used by governments in the future. "If you are going to attack virtual assets, the best thing to use would be virtual agents," he told New Scientist. "Technology is always incorporated into warfare." Information offensive Gershwin also told the Committee that lone hackers and even computer-savvy terrorists currently pose a minor threat to national infrastructure compared to foreign governments. "National cyber warfare programs are unique in posing a threat along the entire spectrum of objectives that might harm US interests," he said. "For the next five to 10 years or so, only nation states appear to have the discipline, commitment and resources to fully develop capabilities to attack critical infrastructures." A study produced by the US Department of Defence in March 2001 acknowledges the danger of international information warfare. It highlights vulnerabilities in the US military's computer infrastructure and recommends that the government develop countermeasures in order to protect itself from an "information offensive". Global law Global computer crime is also in the spotlight, with a new international convention aimed at cracking down on computer hackers, virus writers and internet fraudsters. The final version of Council of Europe's Cyber-Crime Convention will be published on 29 June. The international nature of modern computer crime has prompted law enforcers to call for laws with global reach. The Council consists of 43 European countries, but the treaty also has the backing of the US and Japan, which will be allowed to sign up. The final version of the treaty is expected to guarantee in international law a right for national governments to monitor computer communication. The treaty will also require international co-operation in criminal investigations. Balance of rights The Council's Committee on Crime Problems has drawn up the treaty but has had to make concessions in the process. Original drafts of the document threatened to outlaw some common computer tools but opposition from computer experts forced this to change. In May, the Committee also bowed to criticism from privacy groups and included protection for individual human rights in the treaty, although some still say that the Convention goes too far. "The law enforcement measures haven't been balanced well with individual's human rights," says Yaman Akdeniz, director of Cyber Rights Cyber Liberties. "And I'm not expecting many changes from the last version." ======================================================= Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT FROM THE DESK OF: *Michael Spitzer* <[EMAIL PROTECTED]> The Best Way To Destroy Enemies Is To Change Them To Friends ======================================================= <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om