Cyber Attacks: Removing Roadblocks to Investigation and Information Sharing : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining the Incidence of Cyber Attacks on the Nation's Information Systems, Focusing on Removing the Roadblocks to Investigation and Information Sharing, March 28, 2000 |
Other editions - View all
Common terms and phrases
ability administrative analysis Attorney authorities Carnegie Mellon University CERT CERT Coordination Center CERT/CC Chairman companies computer crime computer intrusion computer networks computer security computer systems Congress cooperation criminal investigation critical infrastructure cyber attacks cyber crime cybercrime damage DDOS DDOS attack Defense denial of service Department of Justice detailees electronic encryption FBI field offices FBI's Federal hacker hacking incident response industry information security information sharing information technology InfoSec Internet fraud issues ITAA jurisdiction law enforcement law enforcement agencies legislation ment Mewhiney national security NIPC operations organizations pen register Pethia Police private sector problem programs prosecution Protection Center puter Question response teams Secret Service security incidents Senator Feinstein Senator GRASSLEY Senator KYL Senator Schumer service attacks statute subcommittee subpoena systems and networks technical terrorists Thank threat tion users USSS victim violations virus vulnerabilities warnings
Popular passages
Page 27 - Insider threat The disgruntled organization insider is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a...
Page 29 - Terrorists groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and to communicate securely.
Page 29 - Cyber terrorism' — by which I mean the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population — is thus a very real, though still largely potential, threat.
Page 29 - Knowing that they cannot match our military might with conventional or "kinetic" weapons, nations see cyber attacks on our critical infrastructures or military operations as a way to hit what they perceive as America's Achilles heel— our growing dependence on information technology in government and commercial operations. For example, two Chinese military officers recently published a book that called for the use of unconventional measures, including the propagation of computer viruses, to counterbalance...
Page 7 - If I can be of any further assistance, please do not hesitate to contact me or Executive Director Jim Pasco at my Washington office.
Page 31 - ... gain notoriety due to the great deal of attention that was being payed to the Y2K rollover. Accordingly, we decided to issue a series of alerts in December to government agencies, industry, and the public about the DDOS threat. Moreover, in late December, we determined that a detection tool that we had developed for investigative purposes might also be used by network operators to detect the presence of DDOS agents or masters on their operating systems, and thus would enable them to remove an...
Page 29 - information warfare" by foreign militaries against our critical infrastructures is perhaps the greatest potential cyber threat to our national security. We know that several foreign nations are developing information warfare doctrine, programs, and capabilities for use against the United States or other nations. Knowing that they cannot match our military might with conventional or "kinetic...
Page 50 - Information technology represents over 6 percent of global gross domestic product (GDP), a spending volume of more than $1.8 trillion, and over 8% of US GDP, according to Digital Planet, a report recently released by the World Information Technology and Services Alliance (WITSA).
Page 52 - ... crime can be thought of as an escalating arms race, in which each time the "good guys" develop a technology solution to a particular threat, the "bad guys" develop a new means of attack. So to mandate a particular "solution" may be exactly the wrong way to go if a new threat will soon be appearing. It is also critical that best practices are developed the way much of the Internet and surrounding technologies have progressed — through "de facto" standards being established without burdensome...
Page 80 - It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is a party to the communication or where one of the parties to the communication has given prior consent to such interception...