News


DATE=6/10/98
TYPE=CORRESPONDENT REPORT
NUMBER=2-233679
TITLE=U-S CYBER THREAT (L ONLY)
BYLINE=JIM MALONE
DATELINE=WASHINGTON
CONTENT=
VOICED AT: 

INTRO:  U-S INTELLIGENCE OFFICIALS TOLD CONGRESS WEDNESDAY THAT A
SIMULATED ATTACK LAST YEAR ON GOVERNMENT COMPUTER SYSTEMS SHOWED 
A GAPING HOLE IN NATIONAL SECURITY WHICH COULD BE EXPLOITED BY 
HOSTILE NATIONS AND TERRORIST GROUPS. V-O-A NATIONAL 
CORRESPONDENT JIM MALONE REPORTS THAT CONGRESS AND THE CLINTON 
ADMINISTRATION ARE TRYING TO BEEF UP THE NATION'S CAPABILITY TO 
COUNTER A CYBER-ATTACK FROM BOTH INSIDE THE COUNTRY AND ABROAD.

TEXT:  IT IS A FRIGHTENING SCENARIO. WITH A FEW TAPS OF A 
KEYBOARD THOUSANDS OF KILOMETERS AWAY, A SMALL BAND OF 
COMPUTER-SAVVY TERRORISTS COULD CONCEIVABLY DISRUPT 
COMMUNICATIONS ACROSS THE UNITED STATES.

AS THE NEW CENTURY APPROACHES, CLINTON ADMINISTRATION OFFICIALS 
AND MEMBERS OF CONGRESS FROM BOTH PARTIES ARE TAKING THE THREAT 
SERIOUSLY.

SENATOR JOHN KYL (REPUBLICAN-ARIZONA) CHAIRS A SENATE (JUDICIARY)
SUBCOMMITTEE ON TECHNOLOGY AND TERRORISM PROBING HOW THE UNITED 
STATES CAN BETTER DEFEND ITSELF FROM CYBER-WARFARE. 

                         /// KYL ACT ///

         TODAY AN ENEMY DOES NOT NEED TO TRAVEL THOUSANDS OF 
         MILES TO ATTACK US. AN ENEMY DOES NOT NEED TO CARRY TONS
         OF IRON BOMBS. AN ENEMY DOES NOT NEED TO RISK DETECTION 
         DURING THE LONG JOURNEY. TODAY, BECAUSE OF THE NETWORKED
         NATURE OF OUR CRITICAL INFRASTRUCTURES, OUR ENEMIES DO 
         NOT NEED TO RISK ATTACKING OUR MILITARY IF THEY CAN MUCH
         MORE EASILY ATTACK OUR SOFT DIGITAL UNDERBELLY.

                        /// END ACT. ///

THAT SOFT UNDERBELLY MAY BE MORE VULNERABLE THAN FIRST THOUGHT. 
OFFICIALS OF THE NATIONAL SECURITY AGENCY TOLD CONGRESS THAT THE 
RESULTS OF A SIMULATED CYBER-ATTACK AS PART OF A DEFENSE 
DEPARTMENT EXERCISE LAST YEAR REVEALED SOME MAJOR FLAWS.

THE OFFICIALS SAY IT TOOK GOVERNMENT EXPERTS SEVERAL DAYS TO EVEN
REALIZE THAT VITAL COMPUTER SYSTEMS WERE UNDER ATTACK. AND IT 
TOOK EVEN MORE TIME TO IDENTIFY WHERE THE ATTACKS WERE COMING 
FROM. THEIR CONCLUSION WAS THAT IT WOULD ONLY TAKE A MATTER OF 
DAYS BEFORE A CAREFULLY PLANNED CYBER-ASSAULT WOULD DISRUPT THE 
DEFENSE DEPARTMENT'S ABILITY TO RAPIDLY DEPLOY FORCES OVERSEAS.

RICHARD CLARKE IS THE SENIOR DIRECTOR OF THE NATIONAL SECURITY 
COUNCIL. HE IS WORKING WITH THE F-B-I TO DEVELOP AN EFFECTIVE 
DEFENSE FOR CYBER-WARFARE.   

                       /// CLARKE ACT ///

         BY ATTACKING THE INTERCONNECTED COMPUTER NETWORKS THAT 
         ARE ACCESSIBLE THROUGH PUBLIC TELEPHONE LINES AND ARE 
         NETWORKED INTO EACH OTHER, IT COULD, AND I THINK THIS IS
         MORE THAN THEORETICALLY, IT COULD BE POSSIBLE TO DISRUPT
         SECTORS OF OUR BANKING INDUSTRY AND OUR FINANCE 
         INDUSTRY. (AND) TO CREATE WIDESPREAD AND PERSISTENT 
         POWER OUTAGES, TO INTERRUPT KEY TRANSPORTATION NODES 
         (CENTERS)--RAIL, HARBORS, AVIATION. AND IT COULD BE 
         POSSIBLE TO CRASH COMMUNICATIONS NETWORKS FAR MORE 
         DAMAGING THAN THE OUTAGE OF THE GALAXY FOUR 
         (COMMUNICATIONS) SATELLITE (LAST MONTH) BY THE ENTIRE 
         NETWORKS GOING OFF LINE AND STAYING OFF LINE.

                        /// END ACT. ///

SECURITY OFFICIALS SAY A PARTNERSHIP BETWEEN THE GOVERNMENT AND 
PRIVATE INDUSTRY WILL BE ESSENTIAL TO DEVELOPING EFFECTIVE 
DEFENSE SYSTEMS. ONE OF THE FIRST PRIORITIES IS AN IMPROVED 
WARNING AND DETECTION SYSTEM SO THAT THE GOVERNMENT CAN KNOW WHEN
ITS COMMUNICATIONS INFRASTRUCTURE IS UNDER ATTACK.

LAST MONTH, PRESIDENT CLINTON ISSUED TWO POLICY DIRECTIVES AIMED 
AT IMPROVING THE U-S CYBER-DEFENSE SYSTEM. ADMINISTRATION 
OFFICIALS AND THE CONGRESS ARE WORKING TOGETHER ON ESTABLISHING 
WHAT THEY CALL AN INITIAL CYBER-DEFENSE CAPABILITY WITHIN TWO 
YEARS. (SIGNED)

NEB/JBM/JO

10-Jun-98 4:57 PM EDT (2057 UTC)
NNNN

Source: Voice of America
.