1
theater, grass-roots organizing and graffiti to cyberspace. Operations include espionage,Web page defacements, ‘denial-of-service’ attacks to swamp the target and virus infections. “We’re going to start seeing this sort of thing for a whole range of issues”, including animal rights and other fringe causes, said Anderson, a data security expert whose resume includes consulting jobs for the FBI and its counterparts in Britain, Russia, Germany, Norway, Denmark and Switzerland. Hacktivists are increasingly focusing on companies rather than governments, he told a press conference. Calling it a “gray area” for law enforcers, Anderson said in some ways the phenomenon was not unlike old-fashioned picketing. The survey listed 12 countries or parts of countries as representing “extreme” political and security risks to multinational companies, up from five in 1997, when Control Risk introduced its current ratings scale. Those countries are Afghanistan, Burundi, Chad, Congo (Brazzaville and Democratic Republic of Congo), Eritrea, Theiopia, Liberia, Russia (Chechnya), Sierra Leone, Somalia, Sri Lanka (north and north east) and Sudan. US Department of Defense Prepares Cybercrime Database The Defense Department is on the verge of completing a common database to aid the defence and intelligence communities in battling cyber- crime, according to the new commander of the Pentagon’s Joint Task Force for Computer Network Defense. The database will enable those involved in computer emergency response across DOD, the intelligence agencies and the FBI to share information critical to protecting their networks against intruders. The database is in the final stages of development and likely will be “an operational reality” in early 2001, said Maj. Gen. James Bryan, who commands the JTF- CND. “Having the ability to create a common database and to share that database allows us to take advantage of modern Web techniques in regard to management, reporting and alerting”, said Bryan, who also serves as the vice director of the Defense Information Systems Agency. One of the main benefits, according to Bryan, is that the department will be able to collect data on cyber- attacks or attempted attacks, categorize them and bet- ter understand them.“Storing them in a database that can be shared means we can profile the threats so that we can see patterns of activity that will allow us to do a much better job of understanding and describing what’s going on and taking the proper actions to counter it”, Bryan said.“Also, I think a shared database allows people to do what humans do best, and that is to share ideas”, he said.“The really qualified people in this computer network warfare business are a fairly small community of experts, and this database will provide them a forum and opportunity not only to share data but to share ideas as well.” The database is only one of several initiatives the task force is undertaking to build its arsenal of cyberwar- fare weaponry. Others include developing automat- ed technologies for monitoring the network, report- ing intrusion events and improving response time. “We’ve got to develop more real-time intrusion detection and ways of reporting without becoming intrusive ourselves”, Bryan said. “We’re developing technology that will allow us to automatically sense whether our firewalls have the right configuration within them or whether the anti-virus updates are in fact up to date.” CIA Chat Room Causes Grief The CIA is investigating 160 employees and contrac- tors for exchanging “inappropriate” E-mail and off- colour jokes in a secret chat room created within the agency’s classified computer network and hidden from management. CIA spokesman Bill Harlow said the willful “misuse of computers” did not “involve the compromise of any classified information.” But the probe, nearing completion, involves employees at all levels of the agency, including some senior managers, and most likely will result in at least a few firings, agency officials said. 674 Security Views/Dr. Bill Hancock

US Department of Defense Prepares Cybercrime Database

Embed Size (px)

Citation preview

Page 1: US Department of Defense Prepares Cybercrime Database

theater, grass-roots organizing and graffiti tocyberspace. Operations include espionage, Web pagedefacements, ‘denial-of-service’ attacks to swamp thetarget and virus infections.

“We’re going to start seeing this sort of thing for awhole range of issues”, including animal rights andother fringe causes, said Anderson, a data securityexpert whose resume includes consulting jobs forthe FBI and its counterparts in Britain, Russia,Germany, Norway, Denmark and Switzerland.Hacktivists are increasingly focusing on companiesrather than governments, he told a press conference.Calling it a “gray area” for law enforcers, Andersonsaid in some ways the phenomenon was not unlikeold-fashioned picketing.

The survey listed 12 countries or parts of countries asrepresenting “extreme” political and security risks tomultinational companies, up from five in 1997, whenControl Risk introduced its current ratings scale.Those countries are Afghanistan, Burundi, Chad,Congo (Brazzaville and Democratic Republic ofCongo), Eritrea, Theiopia, Liberia, Russia(Chechnya), Sierra Leone, Somalia, Sri Lanka (northand north east) and Sudan.

US Department of DefensePrepares Cybercrime DatabaseThe Defense Department is on the verge of completing a common database to aid the defence and intelligence communities in battling cyber-crime, according to the new commander of the Pentagon’s Joint Task Force for ComputerNetwork Defense. The database will enable thoseinvolved in computer emergency response acrossDOD, the intelligence agencies and the FBI to shareinformation critical to protecting their networksagainst intruders.

The database is in the final stages of development andlikely will be “an operational reality” in early 2001,said Maj. Gen. James Bryan, who commands the JTF-CND. “Having the ability to create a commondatabase and to share that database allows us to take

advantage of modern Web techniques in regard tomanagement, reporting and alerting”, said Bryan, whoalso serves as the vice director of the DefenseInformation Systems Agency.

One of the main benefits, according to Bryan, is thatthe department will be able to collect data on cyber-attacks or attempted attacks, categorize them and bet-ter understand them.“Storing them in a database thatcan be shared means we can profile the threats so thatwe can see patterns of activity that will allow us to doa much better job of understanding and describingwhat’s going on and taking the proper actions tocounter it”, Bryan said.“Also, I think a shared databaseallows people to do what humans do best, and that isto share ideas”, he said.“The really qualified people inthis computer network warfare business are a fairlysmall community of experts, and this database willprovide them a forum and opportunity not only toshare data but to share ideas as well.”

The database is only one of several initiatives the taskforce is undertaking to build its arsenal of cyberwar-fare weaponry. Others include developing automat-ed technologies for monitoring the network, report-ing intrusion events and improving response time.“We’ve got to develop more real-time intrusiondetection and ways of reporting without becomingintrusive ourselves”, Bryan said. “We’re developingtechnology that will allow us to automatically sensewhether our firewalls have the right configurationwithin them or whether the anti-virus updates are infact up to date.”

CIA Chat Room Causes GriefThe CIA is investigating 160 employees and contrac-tors for exchanging “inappropriate” E-mail and off-colour jokes in a secret chat room created within theagency’s classified computer network and hidden frommanagement. CIA spokesman Bill Harlow said thewillful “misuse of computers” did not “involve thecompromise of any classified information.” But theprobe, nearing completion, involves employees at alllevels of the agency, including some senior managers,and most likely will result in at least a few firings,agency officials said.

674

Security Views/Dr. Bill Hancock