919 lines
39 KiB
Plaintext
919 lines
39 KiB
Plaintext
|
|
Computer underground Digest Wed Jul 10, 1996 Volume 8 : Issue 52
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #8.52 (Wed, Jul 10, 1996)
|
|
|
|
File 1--DOJ calls for "Manhattan Project" to combat "the new cyber threats"
|
|
File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Sun, 9 Jun 1996 01:04:51 -0500
|
|
From: Mike Godwin <mnemonic@eff.org>
|
|
Subject: File 1-- DOJ calls for "Manhattan Project" to combat "the new cyber threats"
|
|
|
|
|
|
[The following document was typed in from a photocopy by Mike
|
|
Godwin, mnemonic@well.com. Any errors in transcription are his.]
|
|
|
|
NATIONAL SECURITY IN THE INFORMATION AGE
|
|
Conference at the U.S. Air Force Academy,
|
|
Colorado Springs, Colorado
|
|
29 February 1996
|
|
|
|
THE HONORABLE JAMIE S. GORELICK,
|
|
DEPUTY ATTORNEY GENERAL OF THE UNITED STATES
|
|
|
|
Thank you for that kind introduction. I very much appreciate the
|
|
opportunity to speak with you this evening about national
|
|
security in the information age. You have brought together a
|
|
truly remarkable collection of people for this conference. This
|
|
is precisely the sort of cross-section of government and
|
|
industry that is needed for us to begin working through the
|
|
difficult policy questions that must be resolved.
|
|
|
|
In some ways, what we are experiencing today is sort of the "Big
|
|
Bang" moment in the development of information technology: New
|
|
technology is virtually exploding onto the scene, with important
|
|
developments occurring almost daily. With each new technological
|
|
innovation, there are not only myriad new opportunities for
|
|
business and new conveniences for consumers, but also new legal
|
|
and policy issues for national policymakers to confront. And
|
|
since, as many of you know,
|
|
|
|
|
|
Begin Page 2
|
|
|
|
policy making in Washington is not always lightning-quick, it
|
|
will not surprise you to learn that the development of
|
|
technology has to a large degree outpaced our planning and
|
|
actions.
|
|
|
|
Fortunately, though, this has begun to change. Tonight, I would
|
|
like to speak with you about some of the important developments
|
|
that are taking place in Washington concerning national security
|
|
in the information age. More importantly, I want to underscore
|
|
the importance of developing and continuing a dialogue between
|
|
government and industry on these issues. Simply put, no matter
|
|
what we try to do in Washington, we will get nowhere unless we
|
|
successfully enlist the assistance and cooperation of the
|
|
private sector.
|
|
|
|
At the same time, though, The private sector must recognize that
|
|
a government role is also indispensable. Government and private
|
|
industry are, in a very real way, interdependent in this area.
|
|
No workable solution to the myriad problems can be devised by
|
|
one or the other unilaterally. We have to work together.
|
|
|
|
|
|
Begin Page 3
|
|
|
|
* * *
|
|
|
|
One of the most striking things about the explosion of new
|
|
information technology over the last couple of years, in this
|
|
"Age of the Internet," is the way in which that technology is
|
|
often portrayed as an unqualified "good." The exponential growth
|
|
of the Internet, the expansion of digital and cellular phone
|
|
systems, and the proliferation of unbreakable encryption are
|
|
viewed by some as unconditionally positive developments.
|
|
Correspondingly, any effort to regulate the use of these new
|
|
technologies is seen as "bad," as the work of neo-Luddites, and
|
|
as inevitably doomed to failure.
|
|
|
|
We are witnessing this phenomenon right now in the raging debate
|
|
over efforts to restrict pornography on the Internet. We saw it
|
|
last year in the debate over the FBI's effort to ensure that it
|
|
can continue to conduct legally authorized wiretaps on digital
|
|
telephones. And we see it, too, in the ongoing effort to develop
|
|
a national encryption policy, in which we
|
|
|
|
|
|
Begin Page 4
|
|
|
|
seek to encourage the use of strong encryption while protecting
|
|
the interests that all of us have in effective law enforcement
|
|
and national security systems.
|
|
|
|
In all of these debates, the decibel level is high. Many critics
|
|
of government start from the proposition that any involvement by
|
|
Washington is necessarily bad. In such circumstances, it is
|
|
difficult even to engage in rational discourse, let alone find
|
|
common ground.
|
|
|
|
Clearly, we need to step back, take a deep breath, and recognize
|
|
a fundamental principle for starters: technology is not
|
|
inherently "good." Nor is it inherently "evil." Rather, it is a
|
|
tool whose virtue and worth depend on the use to which people
|
|
put it.
|
|
|
|
Everyone recognizes this simple proposition in the case of
|
|
nuclear technology. Obviously, that technology can be enormously
|
|
useful -- if harnessed correctly, it can end our dependence on
|
|
fossil fuels, satisfy our energy needs, and reduce pollution
|
|
caused by burning coal, oil, or gas. But it also is potentially
|
|
evil, if
|
|
|
|
|
|
Begin Page 5
|
|
|
|
it is turned into nuclear weapons used by a rogue state or
|
|
terrorists to kill innocent people.
|
|
|
|
But this notion of "moral neutrality" is not the universal view
|
|
when it comes to information technology. It is easy to grasp
|
|
the potential good of this technology. The spread of the
|
|
Internet, for instance, can greatly enhance our lives in
|
|
countless ways: It can connect people across vast distances; it
|
|
can disseminate knowledge to far-flung corners of the earth; it
|
|
can spread the message of democracy to people who labor under
|
|
tyrannical regimes; it can improve our own democratic process by
|
|
allowing candidates to distribute their message more broadly and
|
|
cheaply or by permitting the people to make their voices -- and
|
|
their votes --heard more clearly; it can allow parents to spend
|
|
more time with their children by "telecommuting"; it can improve
|
|
our children's education by providing even the poorest school
|
|
districts with electronic access to our best teachers; and it
|
|
can improve the lives of our senior citizens by allowing them to
|
|
communicate with
|
|
|
|
|
|
Begin Page 6
|
|
|
|
relatives or shop without leaving their homes. The possibilities
|
|
are truly endless.
|
|
|
|
Similarly, strong encryption has the potential for better
|
|
protecting people's privacy and for increasing our ability to
|
|
conduct electronic commerce without fear of theft or fraud.
|
|
|
|
But what has too often been ignored is the potential for the new
|
|
technology to be put to evil uses. Thus, absent regulation, the
|
|
Internet allows the distribution of child pornography nationwide
|
|
at the push of a button, without any control over who is exposed
|
|
to it. Similarly, it can permit much greater invasion of
|
|
privacy and damage to reputation if private facts about a
|
|
person, or malicious slander, can be spread so quickly and
|
|
easily. In the old days, when gossip spread by word of mouth,
|
|
harm was necessarily limited. But now someone can be
|
|
"electronically slammed" around the world in minutes. And, the
|
|
more people begin to rely on the Internet to conduct electronic
|
|
commerce and everyday communications, the greater potential
|
|
there is for
|
|
|
|
|
|
Begin Page 7
|
|
|
|
invasion of their privacy as credit companies and service
|
|
providers acquire vast amounts of personal information about
|
|
people's purchases, hobbies, interests, phone records, and other
|
|
details of their everyday lives. In the past, it would have
|
|
taken weeks of intensive investigation into a person's life to
|
|
put together a picture of him that can now be developed in
|
|
minutes. And electronically stored private information - - such
|
|
as credit or health records -- not only can be accessed quickly,
|
|
but also can be altered.
|
|
|
|
Encryption, too, can be used for sinister purposes. With the
|
|
proliferation of unbreakable encryption, law enforcement stands
|
|
to lose some of its most effective tools against terrorists and
|
|
organized crime groups. Court-ordered wiretaps that allows us
|
|
to intercept communications and prevent a terrorist plot are
|
|
rendered worthless. Stored data files that might hold the key to
|
|
bringing down an international drug cartel or child pornography
|
|
ring will be undecipherable, allowing some of the most heinous
|
|
criminals to go free.
|
|
|
|
|
|
Begin Page 8
|
|
|
|
Just imagine, for a moment, if we found someone who was abusing
|
|
innocent children to manufacture graphic, hard-core child
|
|
pornography. Imagine that law enforcement successfully obtained
|
|
a warrant to search his office for evidence, including his
|
|
computer files. Imagine, though, that we go to all that effort
|
|
to catch this criminal, only to find that the list of children
|
|
that he uses to produce his pornography is encrypted with DES.
|
|
He's disposed of his only key (or at least he claims he did).
|
|
No key is held in escrow. Dead end for us. Is this really the
|
|
type of constraint we want? Unfortunately, this is _not_ an
|
|
imaginary scenario. This problem is a real one.
|
|
|
|
Or, imagine an employee who encrypts crucial company documents
|
|
just before he quits the company, leaving the company helpless
|
|
to access the plain text . Or a widow who finds that all of her
|
|
deceased spouse's probate files are encrypted, but he did not
|
|
leave a key.
|
|
|
|
Beyond these examples of potential ill-uses [sic] of information
|
|
technologies, there are broader social
|
|
|
|
|
|
Begin Page 9
|
|
|
|
problems that are harder to measure, but which we are slowly
|
|
coming to recognize instinctively. For instance, if people are
|
|
spending hours on end in chat room, conversing with faceless
|
|
strangers thousands of miles away, will they spend less time
|
|
actually talking with their children, their parents and their
|
|
friends? What will this do to interpersonal relations and
|
|
children's intellectual and emotional development?
|
|
|
|
And what effect will the Internet have on the nature of
|
|
communication itself? Anyone who has used e-mail has experienced
|
|
the misunderstandings that arise so frequently in electronic
|
|
conversations. Something odd happens, whether it is that people
|
|
feel more free to discard social conventions like politeness and
|
|
to be brutally candid when they are looking at a computer screen
|
|
instead of a human face; or whether it is the lack of tone,
|
|
intonation or facial expression that accompanies spoken
|
|
communication and can subtly change the meaning of a person's
|
|
actual words or signal that someone is only joking; or whether
|
|
it is the lack of care that goes into messages that someone
|
|
fires off on
|
|
|
|
|
|
Begin Page 10
|
|
|
|
her keyboard rather than taking the time to think out a
|
|
handwritten letter. Something happens that simply engenders
|
|
misunderstandings and hurt feelings more frequently in e-mail
|
|
than in casual conversations by the water cooler or written
|
|
letters to friends. We've all experienced this, but we don't
|
|
quite know what the implications are.
|
|
|
|
The metaphor of the "information Superhighway" has become a
|
|
cliche by now, but let me invoke it one last time before putting
|
|
it to rest! Imagine if, at the advent of the automobile, all of
|
|
the states, as well as individual companies, just started
|
|
building their own roads all over the place, with no speed
|
|
limits, no lane markings, no highway patrol or emergency rescue
|
|
services, no emergency exits, no safety inspections for trucks
|
|
or passenger vehicles. I think everyone would recognize that
|
|
this would be a recipe for disaster. But now as we are
|
|
constructing our "information superhighway," which is a thousand
|
|
times more complicated than our automotive highway system -- and
|
|
provides opportunity for much greater damage if abused
|
|
|
|
|
|
Begin Page 11
|
|
|
|
-- many people are telling the government to just get out of the
|
|
way and let NII develop its own, with no restrictions,
|
|
nonregulation, no effort even to protect our information
|
|
infrastructures from attack or abuse. This simply does not make
|
|
sense.
|
|
|
|
In my view, we really have two choices: We can begin now,
|
|
jointly, to try to come up with solutions to some of the
|
|
difficult issues raised by the growth of the information
|
|
infrastructure in a rational, measured, and prudent way. Or we
|
|
can wait until a crisis occurs, until some cyber catastrophe
|
|
suddenly crystallizes these issues in the public's mind and
|
|
leads to an outcry and a call for immediate government response.
|
|
But, if history teaches us anything, it is exactly this sort of
|
|
crisis mode, when the government is pressured to respond to some
|
|
recent outrage, that we are most likely to overreact and enact
|
|
bad policy [sic]. Let's try to do it now, while cooler heads
|
|
prevail; let's work together to come up with solutions that
|
|
serve the public interests.
|
|
|
|
|
|
Begin Page 12
|
|
|
|
The telecommunications industry, to its great credit,
|
|
understands this interdependence. As a result, I think the
|
|
president's national security telecommunications advisory
|
|
committee -- a joint government-industry body - - has been
|
|
highly successful in crafting solutions to the particular
|
|
problems faced by the telecommunications industry. The NSTAC
|
|
serves as a model, in many ways, for what we need to do for the
|
|
rest of our industries that rely on the national information
|
|
infrastructure.
|
|
|
|
* * *
|
|
|
|
Let me now turn to the particular problems posed by the
|
|
information revolution for our national security. You have heard
|
|
a lot over the last two days about the growing dependence on the
|
|
information infrastructure in all sectors of society --
|
|
military, political, economic, academic, and cultural -- and
|
|
about the increasing interconnectedness of all these sectors.
|
|
The implications for national security are becoming more
|
|
apparent: as we become more interconnected, we are also
|
|
|
|
|
|
Begin Page 13
|
|
|
|
more vulnerable to attack from many different sources. The
|
|
information and control systems for our critical industries, for
|
|
instance, are more vulnerable to penetration and disruption;
|
|
information can be more easily stolen, distorted, or destroyed;
|
|
and the very operation of those industries can be brought to a
|
|
halt more quickly and easily.
|
|
|
|
The issue of how we address our vulnerability to such attacks
|
|
has often been referred to as a "defensive information warfare."
|
|
But this term can be misleading. It suggests that the issue is
|
|
a problem only for our defense establishment, and should be
|
|
addressed as part of our national defense strategy. Certainly,
|
|
the military sits on a vulnerable platform consisting of
|
|
different critical infrastructures. But civil society sits on
|
|
that same platform. This is therefore also an issue for the
|
|
civilian world. Every person and institution that is connected
|
|
to the "information superhighway" is vulnerable to attack, not
|
|
just those people and institutions involved in our defense
|
|
mission.
|
|
|
|
|
|
Begin Page 14
|
|
|
|
Moreover, the sources of attacks are not limited to nation
|
|
states or other foreign powers during times of war. Rather, they
|
|
can run the gamut, from the disgruntled employee who steals or
|
|
destroys his employers information out of malice; to the
|
|
criminal who steals proprietary information for pecuniary gain;
|
|
to terrorists who seek to cause widespread death or destruction
|
|
to intimidate or coerce the government; to foreign intelligence
|
|
agents who want surreptitiously to access or manipulate
|
|
classified or proprietary information; and, finally, to the
|
|
hostile state using cyber attacks as an instrument of war.
|
|
Obviously, not all of these attacks are directly related to
|
|
defense. All of them are, however, of interest to law
|
|
enforcement.
|
|
|
|
The statistics illustrate, in broad strokes at least, how the
|
|
cyber threat is increasing. From 1991 to 1995, the number of
|
|
Internet hosts increased from approximately 750,000 to over 5
|
|
million, an expansion of over 500%. Not surprisingly, over a
|
|
three-year period from 1991 to
|
|
|
|
|
|
Begin Page 15
|
|
|
|
1994, the number of security incidents reported to the Computer
|
|
Emergency Response Team (or CERT) at Carnegie Mellon University
|
|
increased 498%, and the number of sites affected worldwide was
|
|
up 702%.
|
|
|
|
Recent surveys reinforce the CERT statistics. One survey of 246
|
|
companies revealed that the monthly rate of incidents involving
|
|
the theft of corporate proprietary information rose 260% from
|
|
1985-1993. Only 32 of these companies were willing to quantify
|
|
their losses, which amounted to $1.8 billion. In the other
|
|
survey, almost one quarter of the 898 organizations queried
|
|
reported a computer crime within the previous 12 months. And
|
|
last summer, the Defense Information Systems Agency (DISA),
|
|
reported that attacks on DOD computer systems had doubled from
|
|
only the year before and were then running at a rate of two a
|
|
day.
|
|
|
|
Let me give you a few examples of the types of "cyber" crimes we
|
|
have seen in recent years to put some flesh on the bones of
|
|
these statistics. These cases illustrate how vulnerable we
|
|
already are, both as
|
|
|
|
|
|
Begin Page 16
|
|
|
|
individuals and as institutions, and provide a window into our
|
|
future.
|
|
|
|
* In 1994, nine people, including an MCI employee, were indicted
|
|
for a scheme involving a $50-million telephone calling card
|
|
fraud. Using a sniffer program (which monitors network traffic),
|
|
they captured and used more than 150,000 calling card numbers.
|
|
The scheme had been directed by hackers in Germany who then made
|
|
international calls to attack U.S. computer networks.
|
|
|
|
* A computer hacker broke into files at a bank and a credit
|
|
union, and then used the information to apply for credit cards
|
|
in the victim's name. The criminal then used these cards to go
|
|
on a buying spree. The victim's ability to obtain credit was
|
|
ruined and had to be painstakingly reestablished.
|
|
|
|
|
|
Begin Page 17
|
|
|
|
Hackers broke into Lawrence Livermore Laboratory computers and
|
|
used them to store illegal hard-core pornography. Nearly 2,000
|
|
megabytes with 1,000 images were found on one Internet-linked
|
|
computer.
|
|
|
|
* We have seen transmission of child pornography files by e-mail
|
|
through America Online.
|
|
|
|
* Con artists have used electronic bulletin board systems to
|
|
hype recently-purchased penny stocks, driving up the price and
|
|
giving the con artists a profit.
|
|
|
|
For the most part, these attacks appear to come from
|
|
"unstructured" sources: That is, they are unrelated incursions
|
|
by individuals or small groups usually seeking to steal
|
|
information or services or to cause disruption purely out of
|
|
malice, but with no grand design or organization. In terms of
|
|
national security, though, the greatest threat will come from
|
|
"structured" sources: organized crime groups (we have seen
|
|
instances
|
|
|
|
|
|
Begin Page 18
|
|
|
|
of this), and, more importantly, terrorist organizations,
|
|
foreign intelligence agencies, and foreign military services.
|
|
These are the entities whose efforts are the best financed, the
|
|
most focused, and the most likely to cause widespread damage to
|
|
our national security by disrupting elements of our
|
|
infrastructures that depend on the information superhighway.
|
|
|
|
Even for these structured threats, law enforcement plays a
|
|
critical role. Under Presidential Decision Directive 39, which
|
|
was issued last summer and sets out the administration's
|
|
counterterrorism policy, the Department of Justice (through its
|
|
component, the FBI) is the lead agency responsible for
|
|
combatting terrorism in the United States. And Executive Order
|
|
12333, which has been the guiding instrument for the
|
|
intelligence community since 1981, designates the FBI as the
|
|
lead agency for counterintelligence matters. So clearly, law
|
|
enforcement has an important role in protecting our national
|
|
security against the new cyber threats.
|
|
|
|
|
|
Begin Page 19
|
|
|
|
Our most immediate concern right now is the terrorist threat. As
|
|
our society becomes more and more dependent on the information
|
|
superhighway, we must expand our focus beyond the traditional
|
|
"physical" attacks by terrorists that we have encountered in the
|
|
past, and to anticipate and protect against cyber attacks that
|
|
could cause as great, if not greater, impact as a well-placed
|
|
bomb.
|
|
|
|
It's not hard to imagine how terrorists could use cyber tools to
|
|
wreak massive havoc in this country. Consider the World Trade
|
|
Center case, for example. There was some evidence suggesting
|
|
that the conspirators in that case intended to cause the tower
|
|
to collapse, in order to disrupt the financial markets on wall
|
|
street. That same objective could also be accomplished through
|
|
an electronic attack on the energy or telecommunications systems
|
|
that supply lower Manhattan, or on the information systems of
|
|
the banking and financial institutions themselves.
|
|
|
|
|
|
Begin Page 20
|
|
|
|
The threat is _not_ simply hypothetical. We have already seen
|
|
attacks on elements of the infrastructure that, although
|
|
apparently not committed by terrorists, illustrate the
|
|
vulnerabilities that are present in our information networks,
|
|
and demonstrate the urgency of our situation.
|
|
|
|
* The pending case involving Citibank is one example. Between
|
|
June and October in 1994, approximately 40 wire transfers were
|
|
attempted from Citibank's cash management system through the use
|
|
of a computer and phone lines from St. Petersburg, Russia, by
|
|
compromising the password and user identification code system.
|
|
Citibank was successful in blocking most of the transfers or
|
|
recovering the funds from recipient banks, limiting its losses.
|
|
But the potential loss was enormous. Still, imagine what the
|
|
impact might have been if the intruders' intent was not to steal
|
|
funds from a few accounts, but to bring down the entire bank's
|
|
accounting system; or to zero out the
|
|
|
|
|
|
Begin Page 21
|
|
|
|
records of thousands of accounts; or to disrupt several major
|
|
banks simultaneously.
|
|
|
|
* In 1989, the "Legion of Doom" in Atlanta, Georgia, remotely
|
|
accessed the administrative computers of Bell South and
|
|
wiretapped calls and altered phone services. It could have shut
|
|
down the phone network for the Southeastern United States.
|
|
|
|
* From 1993 to 1995, a man in California gained control of the
|
|
computers running local telephone switches, and discovered
|
|
information concerning U.S. government wiretaps conducted
|
|
pursuant to the Foreign Intelligence Surveillance Act (FISA). He
|
|
also uncovered a criminal wiretap and warned the target.
|
|
|
|
Now, in part through the efforts by joint industry-government
|
|
bodies such as the President's National Security Advisory
|
|
Committee (NSTAC), telecommunications carriers have taken steps
|
|
to prevent,
|
|
|
|
|
|
Begin Page 22
|
|
|
|
or to minimize and contain the damage from, this sort of attack,
|
|
in order to avoid the sort of regional disruption threatened by
|
|
the Legion of Doom. But I don't know anyone who thinks that this
|
|
sort of disruption is no longer a real possibility.
|
|
|
|
The banking and telecommunications infrastructures are not the
|
|
only ones that have been affected.
|
|
|
|
* In 1992, a computer intruder was arrested for tampering with
|
|
the Emergency 911 systems in Virginia, Maryland, and New Jersey
|
|
in order to introduce a virus and bring down the systems.
|
|
|
|
* Also in 1992, a fired employee of an emergency alert network
|
|
sabotaged the firm's computer system by hacking into the
|
|
company's computers, causing them to crash for about 10 hours.
|
|
During that time, there was an emergency at an oil refinery. The
|
|
disabled system was therefore unable to alert thousands of
|
|
nearby residents to a noxious release from the
|
|
|
|
|
|
Begin Page 23
|
|
|
|
refinery. Beyond that, the computer crash potentially
|
|
jeopardized hundreds of thousands of people in 22 states and 6
|
|
areas of Canada where the alert network operated.
|
|
|
|
And, of course, the government itself has not been immune to
|
|
such attacks.
|
|
|
|
* A computer hacker penetrated computer or phone systems of
|
|
universities, government departments, and companies. In the
|
|
U.S. marshals' computer, he found the locations of individual
|
|
federal prisoners, putting the security of our institutions at
|
|
risk. He also stole from an air force base a computer access
|
|
card, which he then sold through the mail.
|
|
|
|
* Finally, a sniffer was introduced into computers of NASA's
|
|
Goddard Space Flight Center, permitting someone to download a
|
|
large volume of complex calibration telemetry calculations
|
|
transmitted from satellites. The
|
|
|
|
|
|
Begin Page 24
|
|
|
|
sniffer remained undetected for an unprecedented length of time.
|
|
|
|
These are just some examples of the cases we've already seen.
|
|
But they should convey to you the urgency of the situation.
|
|
|
|
Now, some of my colleagues in government think it's best not to
|
|
discuss such cases, or to speculate about possible terrorist
|
|
cyber attacks, publicly, for fear of inspiring would-be
|
|
terrorists to carry out just the sort of attacks we're concerned
|
|
about. But I think keeping quiet about the problem is the wrong
|
|
approach. Silence will not appreciably lessen the probability of
|
|
an attack. We must take it as a given that someone is already
|
|
scheming.
|
|
|
|
Instead, our main concern should be to get our own house in
|
|
order and begin constructing our defenses. This means, first and
|
|
foremost, that we need to raise people's consciousness -- both
|
|
within the government and in the relevant sectors of industry.
|
|
This requires that
|
|
|
|
|
|
Begin Page 25
|
|
|
|
we talk about the threat and how to combat it. That is why this
|
|
conference is so valuable. Second, it means we have to figure
|
|
out how to organize ourselves within government, and in the
|
|
private sector, to fight the threat.
|
|
|
|
While the Justice Department is designated as the lead agency
|
|
for fighting terrorism in the U.S., we do not look at the cyber
|
|
threat solely as a subset of terrorism. The potential sources of
|
|
attack are simply too varied. It would be self-defeating to
|
|
concentrate on protecting against terrorist attacks, but to
|
|
ignore the problem of hackers, foreign espionage agents, or
|
|
organized crime groups. Yet, despite the breadth of the problem,
|
|
right now, there is no single agency, no focal point within the
|
|
government responsible for protecting against such attacks. In
|
|
fact, at last count there some 22 agencies and task forces that
|
|
thought they had responsibility for some segment of this
|
|
problem. Similarly, while many individual companies have taken
|
|
steps to secure their information systems, very few industries
|
|
have begun considering this problem on an
|
|
|
|
|
|
Begin Page 26
|
|
|
|
industry-wide scale. But clearly this problem begs for a
|
|
comprehensive approach that involves both industry and
|
|
government in a cooperative effort.
|
|
|
|
So, what needs to be done? Let me set out a roadmap for you, and
|
|
identify in particular where I think help from industry is
|
|
critical.
|
|
|
|
_First_, we have to identify our vulnerabilities. This means
|
|
identifying those components of government and the private
|
|
sector that, if attacked, would result in the greatest harm to
|
|
society, on a regional or national scale These are what we have
|
|
begun calling "critical national infrastructures." We currently
|
|
break those infrastructures into roughly eight categories:
|
|
telecommunications; electrical power systems; transportation;
|
|
water supply systems; emergency services (including medical,
|
|
police, and fire and rescue services); and continuity of
|
|
government and government operations.
|
|
|
|
|
|
Begin Page 27
|
|
|
|
We already have a foundation for this effort. Both the Defense
|
|
Department and the FBI have what they call key asset programs,
|
|
which consist of databases identifying key assets within each
|
|
category of critical infrastructures, and containing
|
|
vulnerability information and emergency points of contact for
|
|
each key asset.
|
|
|
|
Until now, however, both of these programs have focused on
|
|
vulnerabilities to _physical_ attack. DOD and FBI have already
|
|
set out to broaden the focus of these programs to include
|
|
vulnerabilities to cyber attacks and to coordinate the two
|
|
databases. In expanding into the cyber area, we will need a lot
|
|
of cooperation from industry, a willingness to share information
|
|
with us (on a confidential basis) and to work jointly with us in
|
|
determining vulnerabilities.
|
|
|
|
The _second_ thing we need to do is identify the scope and
|
|
sources of the threat. Again, the defense and intelligence
|
|
communities have been concerned with identifying military and
|
|
espionage threats in this
|
|
|
|
|
|
Begin Page 28
|
|
|
|
field. But there has been very little effort to assess
|
|
comprehensively the full range of cyber threats to our
|
|
infrastructures: who poses a threat? What are their
|
|
capabilities? What have they done in the past? What are their
|
|
intentions?
|
|
|
|
This will require a joint effort by the defense, intelligence,
|
|
and law enforcement communities, combining their data and doing
|
|
joint analyses. But it will also require cooperation by
|
|
industry. No analysis can be complete without information about
|
|
what attacks industry has already experienced, and by whom.
|
|
|
|
On this point, let me say that under-reporting of computer
|
|
crimes has been a major problem in getting a handle on the
|
|
nature and scope of the threat. There are two principal reasons
|
|
for this under-reporting. First, many victims don't even now
|
|
they are victims. Let me give you one example. The Justice
|
|
Department handled a case in 1992 involving a hacker intrusion
|
|
into Boeing's supercomputer center in Seattle. The hacker
|
|
downloaded encrypted password files and used Boeing's computers
|
|
to
|
|
|
|
|
|
Begin Page 29
|
|
|
|
run hacker and cracker programs. To its great credit, Boeing
|
|
reported the intrusion to the FBI and partitioned its system to
|
|
allow agents to trace the hackers to the source.
|
|
|
|
In the course of the investigation, the FBI soon learned that
|
|
the hackers had gained access to the entire computer system
|
|
serving the federal district court in Seattle. In fact, he had
|
|
obtained the passwords of both the system administrator and a
|
|
federal judge, forcing the courthouse system to close for a day.
|
|
Yet, without Boeing's call to law enforcement, the federal court
|
|
administrator would not have known that an intruder had acquired
|
|
unfettered access to the court's computers.
|
|
|
|
A second reason for under-reporting is the collateral
|
|
consequences of reporting. To put it bluntly, there may be a lot
|
|
of explaining to do -- to managers, customers, regulators, or
|
|
the public. If it is your job to secure a company's information
|
|
systems, how eager will you be to confess to people that your
|
|
defenses didn't work? Banks are a prime example. If
|
|
|
|
|
|
Begin Page 30
|
|
|
|
you are Citibank, you maybe loath to reveal to depositors that
|
|
their accounts may be vulnerable to electronic theft. Similarly,
|
|
a telecommunications carrier may not want to publicize that its
|
|
customers' conversations have been accessed by so-called "phone
|
|
phreakers."
|
|
|
|
The extent of under-reporting is illustrated by some statistics
|
|
compiled by DISA. As many of you probably know, DISA tests the
|
|
security of DOD computer systems by having its tiger teams
|
|
"attack" the computes using standard hacker methods and tools.
|
|
Over the course of this program, DISA has accumulated some
|
|
telling statistics. At last count, DISA tiger teams had
|
|
successfully penetrated 88% of the computer systems they
|
|
attacked. More startling, system administrators at the
|
|
successfully attacked sites only detected 4% of these
|
|
penetrations. And of the 4 % who discovered the intrusion, only
|
|
5% reported it! If you do the math, you'll see that of the
|
|
10,000 machines attacked, 8,800 were penetrated, only 352
|
|
discovered it, and only 18 reported it. Or put another way, for
|
|
each report of a
|
|
|
|
|
|
Begin Page 31
|
|
|
|
computer intrusion, there were 490 others that went unreported.
|
|
|
|
The FINAL step, and probably the most difficult, is to figure
|
|
out how to organize ourselves to address the problem. Again, I
|
|
believe it is a mistake to think about this problem in
|
|
compartments: that is, for DOD as a military problem; for
|
|
Justice and FBI as a terrorism problem; for the CIA and NSA as
|
|
an espionage problem and for private industry as a white-collar
|
|
crime problem. The threat is too varied. and the problems too
|
|
overlapping, to permit such a fragmented approach. We clearly
|
|
need one focal point in the government to take the lead in
|
|
addressing this issue comprehensively -- to develop national
|
|
policy, coordinate the necessary other agencies, and with
|
|
industry on developing solutions. We need the equivalent of the
|
|
"Manhattan Project" to address the technological issues and to
|
|
help us harden our infrastructures against attack. It might be
|
|
that we can just designate an existing agency to take the lead.
|
|
Or we may need a new agency or some interagency body to perform
|
|
the task.
|
|
|
|
|
|
Begin Page 32
|
|
|
|
But some centralized entity is direly needed to push this effort
|
|
along.
|
|
|
|
Most importantly, though, whatever we decide to do within the
|
|
government, we need to enlist the private sector to join in this
|
|
cooperative venture -- not just in assessing vulnerabilities and
|
|
threats, but in devising and implementing solutions. Simply put,
|
|
without the participation of the private sector, any effort is
|
|
bound to come up short.
|
|
|
|
There are several reasons for this. _First_, at the most basic
|
|
level, most components of the national information
|
|
infrastructure, as well as the critical industries and
|
|
institutions that depend on the NII, are in private hands. This
|
|
means that, absent statutory authority to regulate a particular
|
|
industry, the government has limited ability to require private
|
|
companies to take protective measures; it can merely advise
|
|
industry and urge it to "do the right thing." And even if
|
|
government convinces industry to take protective measures, there
|
|
remains the knotty question
|
|
|
|
|
|
Begin Page 33
|
|
|
|
of who will pay for such measures (or for restoration of service
|
|
after an attack). Although private companies have an obvious
|
|
financial incentive to take steps to reduce thefts, it is less
|
|
clear that they are willing to incur the costs necessary to
|
|
protect their plants or information systems against a purely
|
|
malicious or terrorist attack. These are issues that need to be
|
|
worked out by industry and government together.
|
|
|
|
_Second_, private sector involvement in crafting and
|
|
implementing solutions is needed in order to engender the trust
|
|
in government that will be necessary to implement any solution.
|
|
Few people question the need for a government role, at some
|
|
level, in protecting the physical plant of the nation's critical
|
|
infrastructures. But the same cannot be said in the information
|
|
technology arena. The notion of government involvement in this
|
|
area immediately raises concerns about privacy, economic
|
|
competitiveness, and protection of proprietary information. The
|
|
raging debate over the government's encryption policy is just
|
|
one example. These concerns are not easily reconciled with the
|
|
interests in national
|
|
|
|
Page 34
|
|
|
|
security and law enforcement; but to ignore them would render
|
|
any effort futile.
|
|
|
|
We are currently trying to come up with a framework for
|
|
addressing all these issues. No decisions have been made yet, so
|
|
I cannot report to you on precisely where we are headed. But I
|
|
do know that, in the very near future, we will be reaching out
|
|
to critical industries to get them integrally involved in the
|
|
process. I ask you to join us in this vital effort; to sit down
|
|
with us and share your concerns, your ideas, your skill and
|
|
expertise, and your energy; and to work with us to begin
|
|
addressing this problem.
|
|
|
|
There are many skeptics who say that we will have to endure the
|
|
electronic equivalent of Pearl Harbor or Oklahoma City before
|
|
the key players in government or industry wake up to the problem
|
|
of protecting our information and other critical infrastructures
|
|
from the new cyber threats. The fact that the Olin Foundation
|
|
and the Air Force are holding this conference, however, and
|
|
|
|
|
|
Begin Page 35
|
|
|
|
have succeeded in getting such a diverse and high-level group of
|
|
participants disproves this pessimistic view.
|
|
|
|
But we cannot stop here. It is not enough to identify the
|
|
problem and to talk about it. After this conference, we need to
|
|
begin taking action. So I ask you to join us in taking those
|
|
next steps. We need to educate industry about the problem,
|
|
determine its scope, and create a joint approach to developing
|
|
solutions. If we in government begin to pause or stumble, prod
|
|
us or help us up. There will be much resistance along the way;
|
|
but given the importance of the issue, inaction would be
|
|
intolerable.
|
|
|
|
Thank you.
|
|
|
|
---------------
|
|
|
|
------------------------------
|
|
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 21 Mar 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 2--Cu Digest Header Info (unchanged since 7 Apr, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #8.52
|
|
************************************
|
|
|