PDA

View Full Version : Down and Dirty - Where's the Warrant



xrayzebra
09-04-2007, 08:52 AM
Cyber wars abound. Do we need a warrant to do this? As
if it mattered.

Beware: enemy attacks in cyberspace

By Demetri Sevastopulo in Washington

Published: September 3 2007 19:00 | Last updated: September 3 2007 19:00

Lieutenant General Robert Elder, senior Air Force officer for cyberspace issues, recently joked that North Korea “must only have one laptop” to make the more serious point that every potential adversary – except Pyongyang – routinely scans US computer networks.

North Korea may be impotent in cyberspace, but its neighbour is not. The Chinese military sent a shiver down the Pentagon’s spine in June by successfully hacking into an unclassified network used by the top policy advisers to Robert Gates, the defence secretary.

While the People’s Liberation Army has been probing Pentagon networks hundreds of times a day for the past few years, the US is more alarmed at the growing frequency and sophistication of the attacks.

The Pentagon spent several months deflecting the recent onslaught before the PLA penetrated its system, which was shut down for more than a week for diagnosis.

While officials are concerned that it downloaded information, they are more concerned about the strategic ramifications.

“The PLA has demonstrated the ability to conduct attacks that disable our system . . . and the ability in a conflict situation to re-enter and disrupt on a very large scale,” said a former official, who added that the PLA has also penetrated the networks of US defence companies and think-tanks.

One senior US official said there was “no doubt” that China was now monitoring email traffic on unclassified government networks.

Intelligence professionals say China has found a simple way to compensate for its lack of expertise in recruiting non-Chinese spies in the US.

China has also come under scrutiny outside Washington. At a recent press conference with the German chancellor Angela Merkel, Wen Jiabao, the Chinese premier, expressed “grave concern” over reports that the PLA had used “Trojan Horse” programs to insert spyware into German government networks.

While Chinese military doctrine stresses the importance of cyberspace, many other countries, including the US, engage in electromagnetic trespassing.

This year, for example, Estonia accused Russia of orchestrating a massive attack that temporarily crippled government networks.

The Defence Science Board, an independent Pentagon advisory group, will soon publish a study on non-conventional military challenges that will examine cyber threats.

A former senior US official said while the US had made headway, much more needed to be done.

The US Air Force will soon create a cyber war-fighting command aimed at improving defensive and offensive capabilities to counter such asymmetric threats. “We want to ensure that we can operate freely in the domain,” says Major General Charles Ickes, another senior Air Force official involved with cyberspace issues. “On the other hand . . . it is seen by everybody in the defence department as a war-fighting domain and you must have offensive capability.”

Gen Ickes says the military must ensure that its actions do not inadvertently impact on US civilian computer systems. Michael Green, former senior Asia adviser to President George W. Bush, points to an example where the Pentagon had to consider the legal ramifications of blasting a virus back at a hacker.

In an increasingly networked world, governments must consider an even wider range of cyber threats, including terrorist attacks on critical infrastructure, commercial espionage, and old-fashioned spying.

France and Germany have imposed restrictions on senior officials using BlackBerries out of concerns that US intelligence agencies could intercept sensitive emails.

Voicing similar concerns, the White House has also imposed a ban on officials using the devices in some countries, including China. It is also examining whether to restrict domestic use, in a move to panic large swaths of Washington’s BlackBerry-addicted officialdom.

Sami Saydjari, chief executive of Cyber Defense Agency and a former Pentagon cyber expert, warns of the potential for terrorist groups, such as al-Qaeda, to attack the financial, telecoms, and power sectors.

To underscore the threat, he notes that no cyber red team – hackers enlisted to attack systems to help identify weaknesses – has ever failed to meet its objective.

Gregory Garcia, the assistant secretary for cyber security at the department of Homeland Security, says the number of cyber incidents reported to the department’s computer readiness team so far this year is 35,000. That compares to 4,100 for the whole of 2005.

Copyright The Financial Times Limited 2007

"FT" and "Financial Times" are trademarks of the Financial Times. Privacy policy | Terms
© Copyright The Financial Times Ltd 2007.

PixelPusher
09-04-2007, 02:29 PM
Combatting international hackers is diffrent from spying on U.S. citizens. Why is this so hard for you guys to comprehend?

Wild Cobra
09-05-2007, 03:08 AM
As free as I would like the intrernet to be, I would also like to see reasonable and enforceable rules. I have had some thoughts on the issue, but have not been able to find the right mix between freedom and enforcement.

Any thoughts?

George Gervin's Afro
09-05-2007, 06:52 AM
As free as I would like the intrernet to be, I would also like to see reasonable and enforceable rules. I have had some thoughts on the issue, but have not been able to find the right mix between freedom and enforcement.

Any thoughts?


hey I agree with WC on this one.. :oops

xrayzebra
09-05-2007, 09:19 AM
I agree also. It seems to me, that with all the brains we have
out there who know computers inside out that they could come
up with something to stop hacking and viruses.

I read something some time back about some guy who said he
could produce a computer, hardwired, that would be immune to
viruses. But you couldn't load anything else on it.

Before I retired I worked where we used computers within a
network. But there was no outside connection to our tower
except for a maintenance line that when our people had something
to do inside it would call and we would hook the line up along
with a maintenance modem and when they completed their work
they would call again and we disconnected the line and turned
off the modem. It seemed to me like a fool proof system, but
I could be wrong.
I know this wouldn't work for individuals, but it seems firewalls
aren't that much of a challenge to the computer nerds. Although
I understand that if you have a wireless router they cant hack
in, but I wouldn't lay money on it.

spurster
09-05-2007, 10:43 AM
There are many problems.

1) The operating systems (especially WIndows) and software are insecure. Convenience always seems to trump security in design. Also, software companies don't make money unless they produce new versions of software on a schedule and convince you to buy it. The result is buggy, intrinsically insecure software requiring a constant rate of patches.

2) Due to the US and many other countries trying to control cryptography, internet protocols and computers were developed without much cryptography builtin.

3) You can't underestimate the stupid things a user might do, and the computer will be perfectly content to allow. A computer with no outside connection can be easily infected with malware from a USB drive. It used to be malware from floppies so it is hardly a new problem.