-Caveat Lector-

http://www.newscientist.com/dailynews/news.jsp?id=ns9999922


New Scientist June 25, 2001

Smart bomb

Future electronic warfare will be carried out by intelligent software
agents, says CIA intelligence officer


Future electronic warfare will be carried out by intelligent software
agents rather than computer hackers, according to one CIA intelligence
officer.

Lawrence Gershwin, a CIA national intelligence officer, told a US Congress
Joint Economic Committee that increasing computer power could change the
nature of information warfare in coming years.  In particular, it could
make programs designed to mimic human intelligence a common weapon of
enemies of the state.

"Either side could apply research in autonomous software 'agents'.  [These
are] intelligent, mobile and self-replicating software intended to roam a
network gathering data or to reconnoitre other computer network
operations."

Software programs capable of independently performing basic tasks are
already common.  They are often used to search for information but are
sometimes employed by computer hackers to attack other computers.  In May,
for example, a computer worm called sadmind/IIS was designed to
automatically deface web pages after spreading between victims' computers.

Gershwin said that more intelligent agents may be developed by both the US
and its enemies to automate computer network attack and defence.

John Daughman of Cambridge University's computer science department says
that virtual agents will be just one of many new weapons used by
governments in the future.  "If you are going to attack virtual assets, the
best thing to use would be virtual agents," he told New Scientist.
"Technology is always incorporated into warfare."


Information offensive

Gershwin also told the Committee that lone hackers and even computer-savvy
terrorists currently pose a minor threat to national infrastructure
compared to foreign governments.

"National cyber warfare programs are unique in posing a threat along the
entire spectrum of objectives that might harm US interests," he said.  "For
the next five to 10 years or so, only nation states appear to have the
discipline, commitment and resources to fully develop capabilities to
attack critical infrastructures."

A study produced by the US Department of Defence in March 2001 acknowledges
the danger of international information warfare.  It highlights
vulnerabilities in the US military's computer infrastructure and recommends
that the government develop countermeasures in order to protect itself from
an "information offensive".


Global law

Global computer crime is also in the spotlight, with a new international
convention aimed at cracking down on computer hackers, virus writers and
internet fraudsters.  The final version of Council of Europe's Cyber-Crime
Convention will be published on 29 June.

The international nature of modern computer crime has prompted law
enforcers to call for laws with global reach.  The Council consists of 43
European countries, but the treaty also has the backing of the US and
Japan, which will be allowed to sign up.

The final version of the treaty is expected to guarantee in international
law a right for national governments to monitor computer communication.
The treaty will also require international co-operation in criminal
investigations.


Balance of rights

The Council's Committee on Crime Problems has drawn up the treaty but has
had to make concessions in the process.  Original drafts of the document
threatened to outlaw some common computer tools but opposition from
computer experts forced this to change.

In May, the Committee also bowed to criticism from privacy groups and
included protection for individual human rights in the treaty, although
some still say that the Convention goes too far.

"The law enforcement measures haven't been balanced well with individual's
human rights," says Yaman Akdeniz, director of Cyber Rights Cyber
Liberties.
"And I'm not expecting many changes from the last version."


=======================================================
                      Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

          FROM THE DESK OF:

                    *Michael Spitzer*    <[EMAIL PROTECTED]>

    The Best Way To Destroy Enemies Is To Change Them To Friends
=======================================================

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to