They generally don't have any clue what they want. This is only a PR stunt

On Sun, Oct 5, 2008 at 10:30 AM, n3td3v <[EMAIL PROTECTED]> wrote:

> Bad idea,
>
> The rogue government would use hospitals and power stations, to "cyber
> human shield" against the counter attack.
>
> You guys are living in cloud cuckoo land. The rogue government
> wouldn't have their bot nets in home computers that you could shut
> down easily.
>
> Read my rant about it all with the link below that I typed in May 2008
> to stop the "Afcyber" idea going through.
>
> http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062517.html
>
> All the best,
>
> n3td3v
>
> ---------- Forwarded message ----------
> From: Tony Patti <[EMAIL PROTECTED]>
> Date: Sun, Oct 5, 2008 at 5:20 PM
> Subject: cnn.com - Homeland Security seeks cyber counterattack system
> (Einstein 3.0)
> To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
>
>
> I presume this CNN article falls within the "Internet operational and
> technical issues" (especially security) criteria of the NANOG AUP,
> in terms of "operat[ing] an Internet connected network",
> especially where Chertoff refers to " like an anti-aircraft weapon,
> shoot down an [Internet] attack before it hits its target".
>
> http://www.cnn.com/2008/TECH/10/04/chertoff.cyber.security/index.html
>
> Homeland Security seeks cyber counterattack system
>
> WASHINGTON (CNN) -- First, there was "Einstein," the federal
> government's effort to protect itself from cyber attacks by limiting
> the number of portals to government computer systems and searching for
> signs of cyber tampering.
>
> Then Einstein 2.0, a system now being tested to detect computer
> intrusions as they happen.
>
> And in the future? Perhaps Einstein 3.0, which would give the
> government the ability to fight back.
>
> Homeland Security Secretary Michael Chertoff on Friday said he'd like
> to see a government computer infrastructure that could look for early
> indications of computer skullduggery and stop it before it happens.
>
> The system "would literally, like an anti-aircraft weapon, shoot down
> an attack before it hits its target," he said. "And that's what we
> call Einstein 3.0."
>
> At a meeting with reporters to highlight National Cyber Security
> Month, Chertoff reiterated his belief that the government should
> aggressively defend its computer systems, saying that terrorists, if
> they gain expertise already available to others, would "cause
> potentially very serious havoc" to government systems.
>
> "Let's make the investment now rather than wait until there's a huge
> catastrophe," he said.
>
> But despite his emphasis on the risks posed, Chertoff said the
> government is moving slowly to avoid stepping on the toes of the
> private sector as it addresses calls to reorganize the governance of
> cyberspace to provide accountability and authority.
>
> "I think the question of what is the government's role in cyberspace
> in general needs to be discussed among all the stakeholders, because
> there is a culture of cyberspace that is an open architecture," he
> said. "And I think if we just came in and said we want to take it
> over, there'd be, understandably, a considerable amount of discomfort
> with that."
>
> "We are deliberately going slowly because we recognize that the issue
> of government involvement in the Internet is fraught with all kinds of
> potential concerns and potential anxieties about not having the
> government have a big-foot impact on an area of communication and
> commerce that has traditionally been viewed as really independent and
> free."
>
> Chertoff said the government is "feeling our way to what is the right
> mix of government involvement with protecting the Internet in the
> private domain while preserving everybody's comfort level that we're
> not going to be in their business in a way that would be
> inappropriate."
>
> Asked if he envisioned a world with two cyberspaces, he said he
> envisions a world with "a lot of different levels of security and
> trust, depending upon the nature of what it is that you're doing."
>
> "We already have that now, in the sense that we have classified
> systems which are walled off from unclassified systems," he said.
> The Bush administration released its National Cyber Security
> Initiative in January. The "most immediate component" of it from the
> Department of Homeland Security's perspective, Chertoff said, is to
> increase security for federal government computer systems.
>
> But another priority is to work with the private sector to address
> threats to businesses. This includes not only protection from hackers,
> but also from counterfeit parts, which an individual or another nation
> could use to create vulnerabilities in the United States, he said.
> E-mail to a friend
>
>
> Tony Patti
> CIO
> S. Walter Packaging Corp.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
http://www.goldwatches.com/

http://www.jewelerslounge.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to