Computer Security: Cyber Attacks--war Without Borders : Hearing Before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, Second Session, July 26, 2000
United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology
U.S. Government Printing Office, 2001 - Computer crimes - 197 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities appropriate assistance Assurance attacks authorities aware Bureau Center Central Chairman challenge close Committee communications companies component computer security concerning conduct continue controls cooperation coordination countries court critical infrastructure currently cyber crime deal Defense Department detection develop direct Director discuss effective efforts electronic ensure established evidence example experts Federal foreign global going Government Management Horn identify implementation important incident increase industry information sharing infrastructure protection initiatives Institute intelligence interception interests Internet INTERPOL involved issues Latvia law enforcement agencies legislation major Management National NIPC Office operational organizations persons planning police possible prepared present private sector problem protection reporting representatives requests require response risk role sharing specific standards statement Subcommittee technical Thank threats United vulnerabilities warning
Page 185 - Interceptions are required to be conducted in such a way as to "minimize the interception of communications not otherwise subject to interception" under the law, such as unrelated, irrelevant, and non-criminal communications of the subjects
Page 187 - shall upon the request of the applicant, direct that a telecommunications "service provider, landlord, custodian, or other person shall furnish the applicant forthwith all information, facilities, and technical assistance necessary to accomplish the interception unobtrusively and with a minimum of interference with the services that such service provider, landlord, custodian, or person is according the person whose communications are to be intercepted.
Page 15 - throughout the country; provides subject matter experts, equipment, and technical support to cyber investigators in federal, state, and local government agencies involved in critical infrastructure protection; and provides a cyber emergency response capability to help resolve a cyber incident • The Analysis and Warning Section (AWS) serves as the "indications and warning
Page 130 - that potential adversaries are developing a body of knowledge about US systems and about methods to attack these systems. According to Defense officials, these methods, which include sophisticated computer viruses and automated attack routines, allow adversaries to launch untraceable attacks from anywhere in the world.
Page 133 - 63, including development and review of individual agency critical infrastructure protection plans, identification and evaluation of information security standards and best practices, and efforts to build communication links. In January 2000 the White House released its National Plan for Information Systems Protection' as a first major element of a more comprehensive effort to protect the nation's information systems and critical assets from
Page 16 - Field Office. Chapter membership includes representatives from the FBI, private industry, other government agencies, state and local law enforcement, and the academic community. The critical component of InfraGard is the ability of industry to provide information on intrusions to the NIPC and
Page 129 - computer security risks have increased dramatically over the last decade as our government and our nation have become ever more reliant on interconnected computer systems to support critical operations and infrastructures, including telecommunications, finance, power distribution, emergency services, law enforcement, national defense, and other government services.
Page 110 - Information Infrastructure (DII) is a threat to the operational readiness of all Components, the Department is moving aggressively to ensure the continuous availability, integrity, authentication, confidentiality, and non-repudiation of its information and the protection of its information infrastructure. Exercises and real-life events clearly demonstrate that Defense-wide improvement in Information Assurance
Page 17 - will include the development of contingency plans to respond to attacks on each asset, exercises to test response plans, and modeling to determine the effects of an attack on particular assets. FBI Field Offices are responsible for developing a list of the assets within their respective jurisdictions, while the
Page 13 - sanitize law enforcement and intelligence information for inclusion into analyses and reports that it will provide, in appropriate form, to relevant federal, state, and local agencies; the relevant owners and operators of critical infrastructures; and to any private sector information sharing and analysis entity." The NIPC is also charged with issuing "attack warnings or alerts