ad info

CNN.com
 MAIN PAGE
 WORLD
 ASIANOW
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
 TECHNOLOGY
   computing
   personal technology
   space
 NATURE
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 HEALTH
 STYLE
 IN-DEPTH

 custom news
 Headline News brief
 daily almanac
 CNN networks
 CNN programs
 on-air transcripts
 news quiz

  CNN WEB SITES:
CNN Websites
 TIME INC. SITES:
 MORE SERVICES:
 video on demand
 video archive
 audio on demand
 news email services
 free email accounts
 desktop headlines
 pointcast
 pagenet

 DISCUSSION:
 message boards
 chat
 feedback

 SITE GUIDES:
 help
 contents
 search

 FASTER ACCESS:
 europe
 japan

 WEB SERVICES:
Computing

From...

Feds take steps against threat of cyber terrorism

September 25, 1998
Web posted at 12:05 PM EDT

by Elizabeth Wasserman

(IDG) -- The Soviet Union once aimed their missiles at U.S. nuclear silos. When the Cold War ended, terrorists struck at emblematic institutions such as airlines, embassies and the World Trade Center. Now, as the world enters the Information Age, the nation's enemies may go after cyber targets.

That's why the federal government is in the first stages of assessing the nation's telecommunications and information vulnerabilities, anticipating that foes may look to strike Internet "network access points" instead of submarines and missile silos.

Government officials and members of the private sector meet for the first time Friday to start locating vulnerability points to potential cyber or physical attacks. The study, which may take years to complete, aims to recommend ways to eliminate those weak spots, create a system for identifying and preventing attacks, and prepare for attacks through training and education.

MORE COMPUTING INTELLIGENCE
  IDG.net home page
  Industry Standard home page
  Industry Standard email newsletters
  Industry Standard daily Media Grok
  Industry Standard financial news
  Industry Standard e-commerce stories
  Computerworld "Emmerce"
  Fusion financial report
Free registration required to access this site
  InfoWorld Internet commerce section
 Reviews & in-depth info at IDG.net
  IDG.net's personal news page
  Questions about computers? Let IDG.net's editors help you
  Search IDG.net in 12 languages
  Subscribe to IDG.net's free daily newsletter for computer industry cognoscenti
 News Radio
  Fusion audio primers
  Computerworld Minute
     

This study stems from a presidential directive, signed in May, that created a Critical Infrastructure Assurance Office. The office will oversee the development of the first national plan to protect the services that the country depends on daily. But so many of those services transportation, banking and finance, electric power, emergency services and so on are becoming increasingly reliant on telecommunications and information components.

"It's kind of like a farmer who goes out after the winter storm looking to see where the fences are down and where the herd can get out," said Larry Irving, head of the U.S. Commerce Department's National Telecommunications and Information Administration, which is overseeing the telecom study. "It is kind of like surveying the situation. This is a new frontier for us. There's a new infrastructure out there. And we're much more dependent on this infrastructure than we've ever been or ever expected to be."

But Irving acknowledges that he needs the cooperation of private industry in order to conduct a thorough analysis of the infrastructure of a variety of industries: telephone, information technology, cable, satellite, paging, wireless, and even the broadcasting industry, which runs the emergency broadcast system.

While the meeting is open to the public, the results of the government study will not. In fact, in order to win the private sector's cooperation, government officials pledge that they won't keep information on file or divulge it to those who might exploit it.

"One of the things have to do is identify and remedy the situation," Irving said. "On the other hand, we want to make sure we're not putting information out there that could be used by terrorists or competitors. The last thing we want to do is create that road map."

The high-tech and telecommunications industries have recently been at odds with government on such issues as the export of encryption technology, and laws requiring telephone carriers to modify their equipment so law enforcement can carry out wiretaps over digital switches. But Irving said he is trying to foster the spirit of cooperation with industry in a comparable way to the work being done to remedy the year 2000 computer problem.

And the private sector may not have much choice. U.S. policy-makers in the White House, on Capitol Hill and in national security roles say the threat of information weapons coming not only from terrorist operatives but also from foreign governments is a very real potential danger. The targeting of infrastructure facilities through the use of widely available cracking techniques could disable such network-connected services as electric power, banking and telephone. The vulnerability of both government systems and those in private industry has been underscored by the slew of attacks this year on everything from Pentagon computers to The New York Times' Web site.

As the telecommunications structure is changing rapidly, Irving acknowledges that his agency's study will be a snapshot in time. But it will alert both government and private industry to the need for building protections into information and telecommunications systems. "We built an entire system of sidewalks with no curb carve-outs," he said. "If you're building the protections in as you go along, it's much easier."

Related stories:
Latest Headlines

Today on CNN

Related IDG.net stories:

Note: Pages will open in a new browser window

External sites are not
endorsed by CNN Interactive.

SEARCH CNN.com
Enter keyword(s)   go    help

   
 

Back to the top
© 2000 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.