Critical Information Infrastructure Protection: The Threat is Real : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, First Session, on Examining the Protection Efforts Being Made Against Foreign-based Threats to United States Critical Computer Infrastructure, October 6, 1999, Volume 4
United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information
U.S. Government Printing Office, 2001 - Administrative agencies - 59 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
accomplished activity advisories alerts analysis appropriate assets attack brought building called Center changing technology collect Committee communication companies computer intrusions contacts continue coordinate crime scene criminal critical infrastructure cyber cyber intrusions cyber world damage dealt Defense Depart depending determine developing difficult disseminating effectively efforts examples FBI Field Offices Federal final fiscal foreign intelligence services foreign source gather government agencies groups growing hackers hacking identify implement important incidents initiatives interagency intrusions investigation involved issue issuing warnings key assets law enforcement look matter ment military national secu necessary NIPC open source operational particular perpetrator plans points private sector protective protective steps quickly record relevant reports representatives response resulted rity role Senator Kyl share information sources statement steal technical terrorist Thank theft threats tions unclassified understand underway United Vatis vulnerabilities warnings
Page 13 - Not surprisingly, foreign intelligence services have adapted to using cyber tools as part of their espionage tradecraft. Even as far back as 1986, before the worldwide surge in Internet use, the KGB employed West German hackers to access Department of Defense systems in the well-known "Cuckoo's Egg
Page 13 - Criminal groups There is an increased use of cyber intrusions by criminal groups who attack systems for purposes of monetary gain. Foreign intelligence services Foreign intelligence services use cyber tools as part of their information gathering and espionage activities.
Page 14 - Hacktivism refers to politically motivated attacks on publicly accessible Web pages or e-mail servers. These groups and individuals overload e-mail servers and hack into Web sites to send a political message.
Page 35 - Internet, continue to revolutionize the way much of the world communicate and conducts business, this widespread interconnectivity also poses significant risks to the government's and our nation's computer systems and, more importantly, to the critical operations and infrastructures they support.
Page 36 - May 1999, we reported5 that as part of our tests of the National Aeronautics and Space Administration's (NASA) computer-based controls, we successfully penetrated several mission-critical systems, including one responsible for calculating detailed positioning data for each orbiting spacecraft and another that processes and distributes the scientific data received from these spacecraft Having obtained access, we could have disrupted ongoing command and control operations and modified or destroyed...
Page 12 - Last year saw the proliferation of several destructive computer viruses or "worms," including the Melissa Macro Virus, the Explore.Zip worm, and the CIH (Chernobyl) Virus. The NIPC frequently sends out warnings or advisories regarding particularly dangerous viruses, which can allow potential victims to take protective steps and minimize the destructive consequences of a virus. The Melissa Macro Virus was a good example of our two-fold response— encompassing both warning...
Page 15 - Insider threat The disgruntled organization insider is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a victim system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors. Virus writers Virus writers are posing an increasingly serious threat. Several destructive computer viruses and "worms" have harmed files...