From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: ad94ea15ec0853ace008ffeceb09ea013cf9729ff73bd7b6aaf00622442bfff0
Message ID: <199806251240.IAA05050@dewdrop2.mindspring.com>
Reply To: N/A
UTC Datetime: 1998-06-25 12:40:34 UTC
Raw Date: Thu, 25 Jun 1998 05:40:34 -0700 (PDT)
From: John Young <jya@pipeline.com>
Date: Thu, 25 Jun 1998 05:40:34 -0700 (PDT)
To: cypherpunks@toad.com
Subject: CIA 4 Nags: Hackers Crypto Y2K Foreigners
Message-ID: <199806251240.IAA05050@dewdrop2.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain
June 24, 1998
CIA Head Forsees Better Hackers
Filed at 5:43 p.m. EDT
By The Associated Press
WASHINGTON (AP) -- Intrusion into government computers
will become increasingly more sophisticated and better
organized and is likely to involve hostile nations, CIA
Director George Tenet told lawmakers Wednesday.
"Potential attackers range from national intelligence
and military organizations, terrorists, criminals,
industrial competitors, hackers and disgruntled or
disloyal insiders," Tenet told the Senate Governmental
Affairs Committee. "We know with specificity of several
nations that are working on developing an information
warfare capability."
While Tenet did not identify the countries, committee
Chairman Fred Thompson, R-Tenn., who received a classified
briefing on Tuesday, named some of them. Citing published
reports, Thompson said China, Russia, Libya, Iraq and Iran
and at least seven other countries are developing
information warfare programs.
The challenge facing U.S. intelligence will be to detect
attacks on U.S.computers and information systems by
organized or individual hackers. In some cases, Tenet said,
disruptive intrusions orchestrated by hostile states may
be disguised as amateurish efforts by individual hackers.
"Our electric power grids and our telecommunications
networks will be targets of the first order," Tenet said.
"An adversary capable of implanting the right virus or
accessing the right terminal can cause massive damage."
The shift of the computer hacker problem from individuals
and terrorist groups to governments is only beginning,
Tenet said, but he added, "Down the line we are going to
encounter more and it will be more organized."
Tenet cited one case, without naming it, of a foreign
government targeting the United States for intrusion into
information systems.
Sen. Joseph Lieberman, D-Conn., asked if the U.S.
government is taking steps to develop its own offensive
hacking capability to disrupt adversaries and to serve as
a deterrent for computer-based attacks.
"We're not asleep at the switch in this regard," Tenet
replied.
Air Force Lt. Gen. Kenneth Minihan, head of the National
Security Agency, said it was not going too far to think in
terms of an "electronic Pearl Harbor," a well-organized
assault on the United States based on strikes aimed at
electronic information systems.
The most sensitive information centers, such as CIA and
Pentagon classified files, are heavily guarded against
such intrusion and, in most cases, are fenced off from
Internet-type transfers. The problems are more likely to
arise in less well-guarded areas such as financial
networks or industrial control centers.
"They're not going to attack our strengths," Minihan said.
A key area of vulnerability within the intelligence
community, Tenet said, is the possibility of a disloyal
or disgruntled employee wreaking havoc with CIA computers.
Another scenario stems from the difficulty the CIA is
encountering finding enough software specialists to grapple
with the "Year 2000" problem, caused by computers not being
programmed to recognize the shift in the calendar from 1999
to 2000.
Most of the contractors available to help the agency, Tenet
said, would use foreigners, affording "an easy opportunity
to come in and see how your system works and what your
vulnerabilities are."
The running debate over the availability of increasingly
sophisticated encryption technology, which scrambles messages
and data from unauthorized intrusion, also poses a worry,
Tenet said.
Unless the computer industry and the government find a
legislative compromise, the government could fall victim to
hackers able to hide their own actions in impenetrable
encryption codes. It may take a major computer-hacker
incident to create the political pressure needed to allow
the government the "recovery" power to access encrypted
databases.
"There is a train wreck waiting to happen unless we deal
with the recovery aspect of the encryption debate," Tenet
said.
------
Return to June 1998
Return to “John Young <jya@pipeline.com>”
1998-06-25 (Thu, 25 Jun 1998 05:40:34 -0700 (PDT)) - CIA 4 Nags: Hackers Crypto Y2K Foreigners - John Young <jya@pipeline.com>