Security Views/Dr. Bill Hancock
theater, grass-roots organizing and graffiti to cyberspace. Operations include espionage, Web page defacements, ‘denial-of-service’ attacks to swamp the target and virus infections.
advantage of modern Web techniques in regard to management, reporting and alerting”, said Bryan, who also serves as the vice director of the Defense Information Systems Agency.
“We’re going to start seeing this sort of thing for a whole range of issues”, including animal rights and other fringe causes, said Anderson, a data security expert whose resume includes consulting jobs for the FBI and its counterparts in Britain, Russia, Germany, Norway, Denmark and Switzerland. Hacktivists are increasingly focusing on companies rather than governments, he told a press conference. Calling it a “gray area” for law enforcers, Anderson said in some ways the phenomenon was not unlike old-fashioned picketing.
One of the main benefits, according to Bryan, is that the department will be able to collect data on cyberattacks or attempted attacks, categorize them and better understand them.“Storing them in a database that can be shared means we can profile the threats so that we can see patterns of activity that will allow us to do a much better job of understanding and describing what’s going on and taking the proper actions to counter it”, Bryan said.“Also, I think a shared database allows people to do what humans do best, and that is to share ideas”, he said.“The really qualified people in this computer network warfare business are a fairly small community of experts, and this database will provide them a forum and opportunity not only to share data but to share ideas as well.”
The survey listed 12 countries or parts of countries as representing “extreme” political and security risks to multinational companies, up from five in 1997, when Control Risk introduced its current ratings scale. Those countries are Afghanistan, Burundi, Chad, Congo (Brazzaville and Democratic Republic of Congo), Eritrea, Theiopia, Liberia, Russia (Chechnya), Sierra Leone, Somalia, Sri Lanka (north and north east) and Sudan.
US Department of Defense Prepares Cybercrime Database The Defense Department is on the verge of completing a common database to aid the defence and intelligence communities in battling cybercrime, according to the new commander of the Pentagon’s Joint Task Force for Computer Network Defense. The database will enable those involved in computer emergency response across DOD, the intelligence agencies and the FBI to share information critical to protecting their networks against intruders. The database is in the final stages of development and likely will be “an operational reality” in early 2001, said Maj. Gen. James Bryan, who commands the JTFCND. “Having the ability to create a common database and to share that database allows us to take
674
The database is only one of several initiatives the task force is undertaking to build its arsenal of cyberwarfare weaponry. Others include developing automated technologies for monitoring the network, reporting intrusion events and improving response time. “We’ve got to develop more real-time intrusion detection and ways of reporting without becoming intrusive ourselves”, Bryan said. “We’re developing technology that will allow us to automatically sense whether our firewalls have the right configuration within them or whether the anti-virus updates are in fact up to date.”
CIA Chat Room Causes Grief The CIA is investigating 160 employees and contractors for exchanging “inappropriate” E-mail and offcolour jokes in a secret chat room created within the agency’s classified computer network and hidden from management. CIA spokesman Bill Harlow said the willful “misuse of computers” did not “involve the compromise of any classified information.” But the probe, nearing completion, involves employees at all levels of the agency, including some senior managers, and most likely will result in at least a few firings, agency officials said.