Your browser does not seem to support CSS. If images appear below, please disregard them.
It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.
Previous Thread
Next Thread
Print Thread
Rate This Thread
#15771 - 04/25/03 07:49 AM Cyber War (Vulnerabilities)  
Joined: Apr 2003
Posts: 4
smarts Offline
Junior Member
smarts  Offline
Junior Member

Joined: Apr 2003
Posts: 4
California
How vulnerable are we?

A letter from concerned scientists:

Following the Sept. 11 attacks, a group of concerned scientists sent President Bush this letter, in which they warn, "The critical infrastructure of the United States, including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is highly vulnerable to cyber attack. Fast and resolute mitigating action is needed to avoid national disaster." The scientists advocate that the president respond to the cyber threat by setting up a Cyber Warfare Defense Project modeled on the Manhattan Project.


How real is the threat?

Many authorities on national defense and the Internet are warning that the critical infrastructure of the U.S. -- including electrical power, finance, telecommunications, health care, transportation, water, defense, and the Internet -- is highly vulnerable to cyber attack. How imminent is such a threat? And how prepared are we? Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; Amit Yoran of Symantec; O. Sami Saydjari of Cyber Defense Agency; former FBI security expert Ron Dick; James Lewis of the Center for Strategic and International Studies; John Arquilla of the Naval Postgraduate School; former Deputy Secretary of Defense John Hamre; and Scott Charney of Microsoft.


What's needed to secure cyberspace?

Does the U.S. need a regulatory mechanism to get people to pay attention to cyber security? Would liability laws help? More encryption technology? Or a more robust government/private-sector partnership? Here are views on the measures needed and the challenges involved in improving cybersecurity, drawn from FRONTLINE's interviews with Amit Yoran of Symantec; James Lewis of the Center for Strategic and International Studies; John Arquilla of the Naval Postgraduate School; John Hamre, former deputy secretary of defense; Michael Skroch of Sandia National Laboratories; O. Sami Saydjari of Cyber Defense Agency; Scott Charney, chief security strategist at Microsoft; and Richard Clarke, former White House adviser on cyberspace security.


What are Al Qaeda's capabilities?

Over the past year, investigators have accumulated intelligence about Al Qaeda's interests and skills in using cyberspace to launch an attack. Many experts believe terrorists could likely combine such a cyber-based disruption with a real-world physical attack to amplify the impact. Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; John Arquilla of the Naval Postgraduate School; James Lewis of the Center for Strategic and International Studies; John Hamre, former deputy secretary of defense; Michael Skroch of Sandia National Laboratories; Ron Dick, former FBI security expert; and a hacker who spoke on condition of anonymity.


Vulnerabilities: The power grid?

In a potential cyber attack on the U.S., there are experts who believe one of the targets could be the country's electric power grid. By exploiting vulnerabilities in the control systems utility companies use to remotely monitor and manage their operations, U.S. cities could be blacked out for extended periods of time. Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; O. Sami Saydjari of Cyber Defense Agency; Ron Dick, former FBI security expert; James Lewis of the Center for Strategic and International Studies; Michael Skroch of Sandia National Laboratories; John Arquilla of the Naval Postgraduate School; and John Hamre, former deputy secretary of defense.


Vulnerabilities: SCATA systems?

Digital control systems, such as SCADA systems, supervise and control real-world structures like gas pipelines, oil refineries, and power grids -- and they can be manipulated remotely. That, says experts, makes them a potential prime target for terrorist groups who could get inside these systems and inflict physical damage on the nation's infrastructure. Is the clock ticking on this kind of cyber-based threat? Here are excerpts from interviews with Tom Longstaff of the CERT Research Center; James Lewis of the Center for Strategic and International Studies; Joe Weiss of KEMA Consulting; Amit Yoran of Symantec; Michael Skroch of Sandia National Laboratories; and a hacker.


Vulnerabilities: Software?

Some of the most recent worms that have affected computers worldwide took advantage of software vulnerabilities that were previously known to manufacturers. There's also the problem of known vulnerabilities in the software used in SCADA systems. Although many companies maintain that they are doing their best to prevent and self-correct for inadvertent vulnerabilities, critics say the manufacturers should be held more accountable for software security. Here are excerpts from interviews with Amit Yoran of Symantec; John Hamre, former deputy secretary of defense; Richard Clarke, former White House adviser on cyberspace security; Joe Weiss, a security consultant for KEMA Consulting; O. Sami Saydjari of Cyber Defense Agency; Scott Charney, chief security strategist at Microsoft; and a hacker.

Sponsored Links
#15772 - 04/25/03 07:28 PM Re: Cyber War (Vulnerabilities)  
Joined: Apr 2002
Posts: 212
Rapture Offline
Member
Rapture  Offline
Member

Joined: Apr 2002
Posts: 212
Redwood
really needed 3 threads for this?

#15773 - 04/25/03 07:44 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 1,041
Infinite Offline
UGN Elite Poster
Infinite  Offline
UGN Elite Poster

Joined: Mar 2002
Posts: 1,041
Canada eh
/me nods in agreement at rapture

#15774 - 04/26/03 06:48 AM Re: Cyber War (Vulnerabilities)  
Joined: Apr 2003
Posts: 4
smarts Offline
Junior Member
smarts  Offline
Junior Member

Joined: Apr 2003
Posts: 4
California
Nice and ORGANISED that way.
Sheesh.

#15775 - 04/26/03 01:09 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 1,273
SilentRage Offline
DollarDNS Owner
SilentRage  Offline
DollarDNS Owner

Joined: Mar 2002
Posts: 1,273
OH, USA
ja, you don't hear me complaining. I read all 3 long posts, nice postings. Perhaps better fits in the news forum though. That's my only thought.

Where'd you get it? Naming sources is always a good idea.


Domain Registration, Hosting, Management
http://www.dollardns.net
Sponsored Links
#15776 - 04/26/03 07:26 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 1,136
pergesu Offline
UGN Elite Poster
pergesu  Offline
UGN Elite Poster

Joined: Mar 2002
Posts: 1,136
Pimpin the Colorizzle
No complaints here. Rapture and Infinite, shut your traps

#15777 - 04/26/03 10:20 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 524
dashocker Offline
Member
dashocker  Offline
Member

Joined: Mar 2002
Posts: 524
Cornfields everywhere...
Hmmm, SR, you read this? Then you would notice it is a FRONTLINE report. Which I believe airs on PBS. Some interesting stuff here, but it's just another scare tactic being used against the American people. I'm really, really scared of Al-Qaeda "owning" my box. Not, I doubt the government is either. Taking out some power vs. blowing up an embassy? Bombs win everytime. Most of the vulnerable systems outlined are not as weak as this report makes them seem. These infrastructure related computers no doubt require very specialized and *expensive* software. It's not as if I can boot up telnet and go about taking down an oil pipeline. Surely
a private individual going in and attempting to purchase some of the same stuff used by AT&T, for example, will get noticed. I'm not saying our nation's valuable computer systems aren't at risk; I just don't like being terrorized by my own countrymen.

#15778 - 04/26/03 11:37 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 1,273
SilentRage Offline
DollarDNS Owner
SilentRage  Offline
DollarDNS Owner

Joined: Mar 2002
Posts: 1,273
OH, USA
yes, I read it and I don't watch PBS, and I never see FRONTLINE reports. Capish?


Domain Registration, Hosting, Management
http://www.dollardns.net
#15779 - 04/28/03 10:03 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 524
dashocker Offline
Member
dashocker  Offline
Member

Joined: Mar 2002
Posts: 524
Cornfields everywhere...
I think you spelled "Capish" wrong...

#15780 - 04/28/03 10:14 PM Re: Cyber War (Vulnerabilities)  
Joined: Mar 2002
Posts: 1,136
pergesu Offline
UGN Elite Poster
pergesu  Offline
UGN Elite Poster

Joined: Mar 2002
Posts: 1,136
Pimpin the Colorizzle
Rage spells phonetically. The word he's going for is "capisce," but it's never said right in movies anyway. No more discussion of this crap in this thread, or it gets closed.

>> Rage Insert
"capisce" is the foreign word "coppish" ( http://www.word-detective.com/012000.html#coppish ) comes from. In fact, I searched for the word before I typed it, and the "capish" spelling is commonly used. But I agree with perg, spell checking bullshit should be kept to yourself. Not in reply to an otherwise intelligent discussion. And if anything more is said about spelling, then that post should be deleted - not the whole topic closed. I want to delete dashocker's post, but perg already replied.
<<

Sponsored Links

Member Spotlight
Crime
Crime
SC, usa
Posts: 506
Joined: March 2002
Show All Member Profiles 
Forum Statistics
Forums45
Topics46,827
Posts81,997
Average Daily Posts10
Members2,159
Most Online1,567
Apr 25th, 2010
Latest Postings
Top Posters(All Time)
UGN Security 39,991
Gremelin 7,195
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Liked Users (All Time)
§intå× Likes: 1
Cold Sunn Likes: 1
Crime Likes: 1
Cyrez Likes: 1
Ghost Likes: 1
Gremelin Likes: 4
Ice Likes: 1
unreal Likes: 1
Top Liked Users (30 Days)
No Data Found
Powered by UBB.threads™ PHP Forum Software 7.6.0
(Snapshot build 20160902)