-Caveat Lector-

COMPUTER TERRORISM A RISING THREAT;

Scenarios include city black outs, nuclear disasters

Marilyn Geewax Washington Bureau Copyright 2001 Dayton Newspapers, Inc.

WASHINGTON - Most people think America hasn't been the target of a major
attack since Pearl Harbor 60 years ago.

Yet every day, foreigners invade U.S. computers and Internet servers,
causing economic damage that last year totaled about $17 billion and may be
higher this year.

So far, these attacks are no Pearl Harbor - but just wait. Pentagon experts
say cyber-terrorists may be able to black out cities, shut down financial
markets, even trigger disasters at nuclear power plants.

Indeed, one computer expert said the "Code Red" worms that continued to
slow the Internet last week may have been intended to announce to the world
that China can now harm the United States at will.

Despite recent frenzied efforts to protect U.S. networks, most analysts
think the nation will remain highly vulnerable, because computer-controlled
systems are designed to be accessible via the Internet, and the U.S. agency
leading the battle against cyber-terrorism has been criticized as ineffective.

Scenarios like these, the experts say, are plausible:

Using source code stolen from the U.S. Naval Research Laboratory in
Washington, hackers disable Global Positioning System satellites, which the
government plans to make the primary national navigation source for
commercial aviation. Banking, communications, and Internet enterprises
relying on the GPS timing signal are disrupted.

A terrorist manipulates the control system of a gasoline pipeline to create
a "hammering" effect, leading to a leak and an explosion in a major city.
When ambulances and fire trucks try to respond, they are thwarted because
the system that controls traffic lights has been scrambled and streets are
snarled with cars.

A terrorist hacks into a nuclear power plant's central computer, where he
gains control of the generating process and triggers a disastrous meltdown.
Rep. Bob Goodlatte, R-Va., cited this possibility when he introduced a bill
allowing U.S. companies to sell powerful encryption software overseas.

The General Accounting Office, Congress' watchdog agency, reported this
spring that "terrorists or hostile foreign states could launch
computer-based attacks on critical systems to severely damage or disrupt
national defense or other critical operations or steal sensitive data."

Such attacks would exploit weaknesses in computer software or the
increasingly complex web of wires and routers that supports the Internet.

The GAO said likely targets include the nation's communications system,
banks and financial markets, water supplies, transportation systems,
pipelines, emergency services and electric power sources.

"Today, the right command sent over a network to a power generating
station's control computer could be just as effective as a backpack full of
explosives, and the perpetrator would be harder to identify and apprehend,"
concluded the President's Commission on Critical Infrastructure Protection.

Military experts and industry analysts say that so far, cyber-attacks
mostly have caused economic harm, as in the case of a Welsh teenager who
stole 26,000 credit card numbers from nine e-commerce Web sites this
spring, causing $3 million in damage.

But it may be just a matter of time - and not much time - before political
terrorists start replacing thieves and thrill-seeking hackers.

Indeed, one computer expert, Gary Sevounts, who tracks the Code Red worm
for Hewlett-Packard Co. at its Atlanta office, said this mysterious program
may be the nation's first act of cyber-terrorism. The worm was designed to
attack the White House's Web site and to leave a message: "Hacked by Chinese."

If his suspicions are borne out, Sevounts said, "I think this is only the
beginning," because the ability to cripple another nation from the safety
of home is "one of the ultimate tools of terror."

Threats to the nation's computer-based infrastructure can come from
domestic sources as well, said Micheal Erbschloe, vice president of
Computer Economics Inc. of Carlsbad, Calif., and author of a new book,
Information Warfare . But the growing number of foreign-launched attacks is
worrisome.

The Department of Defense already is the target of continual invasions.
"We're talking about 250,000 intrusion attempts a year on DOD computers
alone," he said. "Most of them are domestic and not damaging, but we've had
too many incidents of things coming from outside the country to ignore it."

Because the United States is the focus of hatred for many terrorist groups,
the country's sophisticated computer systems make an especially attractive
target for individuals wanting to make a global statement.

"In a few years, the preferred choice of terrorists is not going to be
blowing themselves up in a car bomb," Erbschloe said. "What we see (with
cyber-terrorism) is that it's becoming more organized as time goes by, and
it's becoming more destructive as well."

While the threats are growing, some believe that the government's top
organization for preventing cyber-terrorism, the National Infrastructure
Protection Center (NIPC), is not up to the job.

The GAO reported this spring that the capability "needed to protect the
nation's critical infrastructures have not yet been achieved" by NIPC.

Its investigation found that because NIPC has "only limited capabilities
for strategic analysis of threats, ... (it) often is not able to provide
timely information" on imminent attacks. GAO also concluded that NIPC
lacked both staff and technical expertise and sometimes operated amid
confusion because its "roles and responsibilities have not been fully defined."

The central problem for those charged with protecting the nation from
terrorism is that the operators of critical infrastructure use the Internet
to communicate, purchase materials and perform many other tasks.

But using the Internet is like installing windows in a sealed building. A
terrorist could slip in through a poorly guarded "window" to work his way
into the computers that control the distribution of electricity, triggering
a blackout.

In addition, because the Defense Department works so closely with industry
on everything from designing communications systems to building aircraft,
terrorists could enter the Pentagon through "back doors" left by private
contractors.

"They always leave 'back doors' because the people who design the systems
usually have some sort of maintenance contract that allows them to log on
and do work on the system remotely from their offices," Erbschloe said.
"The government contractors will say, 'No, we are secure," but we know that
(an authorized break-in) can happen," he said.

Many of these contractors use foreign workers, tens of thousands of whom
are allowed into the United States under the H-1B visa program for
high-skilled workers.

Despite the GAO's concerns about NIPC's ability to protect critical
infrastructure, the agency's reputation may have gotten a boost in recent
weeks by taking prompt and highly visible action during the Code Red incident.

NIPC worked overtime to coordinate federal and industry efforts to track
and slow the attack, said Christopher W. Klaus, founder and chief
technology officer of Internet Security Systems Inc., based in Atlanta.

"We've all learned a lot from this episode with Code Red," he said. "By
working through this crisis, we have been able to forge better
relationships" among the companies and government agencies focused on cyber
security.

Still, some lawmakers want to do more about threats to the Internet.

"I don't think we are taking it seriously enough," said Sen. Jon Kyl,
R-Ariz., ranking member of the Senate subcommittee on technology, terrorism
and government information.

Next month, Kyl plans to join Sen. Robert Bennett, R-Utah, in introducing
legislation to increase joint federal and private industry efforts to
protect critical infrastructures.

In addition, the Bush administration is preparing an executive order to
create a new umbrella security organization to help protect computers and
keep the government functioning in case of a cyber-attack.

In coming weeks, President Bush is expected to create a panel of 23
officials representing various federal departments and agencies to
coordinate cyber-security policy, help Congress develop legislation and
work with private industry groups to protect critical networks.

The new panel is not expected to replace NIPC, but rather would join the
government's hodgepodge of committees, boards and councils responsible for
addressing cyber-threats.

Erbschloe said he doubted such a panel would do as much good as giving NIPC
more money to hire more staff to track threats and prevent attacks.

"The solution is hard work, a lot of diligence and good cooperation, not
rhetoric," he said. "And for the most part, when you get big panels, you
get rhetoric."

On the Web:

National Infrastructure Protection Center at http://www.nipc.gov

Marilyn Geewax's e-mail address is marilyng(at)coxnews.com

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to