ABSTRACT

S. Hrg. 106-838: Cyber Attack: Improving Prevention and Prosecution: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session on Examining how to Combat Cyber Attacks by Improving Prevention and Prosecution, Scottsdale AZ, April 21, 2000   [open pdf - 4MB]

"From the opening statement of Jon Kyl: 'In examining how to combat cyber attacks, it is important to reflect on how the Information Age is rapidly transforming our society. Today, virtually every key service is dependent upon computers --from electrical power grids, to phone systems, air traffic control, banking, military early-warning networks. The list goes on and on. Unfortunately, most of these critical computer networks were not designed with good security measures in mind. The overriding trend in these briefings is that nations and terrorist groups that are hostile to our interests are increasingly choosing not to confront our military strengths directly--that is, by trying to field fleets of advanced fighter planes or aircraft carriers on a par with ours--but, rather, are seeking to exploit our vulnerabilities, looking hard for our Achilles heel. As the ancient Chinese military strategist Sun Tzu said,'You can be sure of succeeding in your attacks if you only attack places which are undefended.' China's current military strategists appear to have taken this lesson to heart. Russia is another country of concern in this area. Last year, a series of widespread intrusions were detected on computer networks operated by the Defense Department, other Federal agencies, and the private sector. U.S. military planners have also begun to try to assess how cyber attacks could affect our military's performance and to take steps to close those vulnerabilities. In addition to being conscious of the threat from foreign countries and the need to take steps to improve the security of the critical computer networks, we need to combat computer hacking by criminals here in the United States, which can also have very serious consequences. Finally, it is important to recognize that private companies own and operate the vast majority of the computer networks used to operate our critical infrastructure.' Statements, letters, and material submitted for the record include those of the following: Jon Kyl, David W. Aucsmith, Guadalupe Gonzalez, Jose Granado, and Janet Napolitano."

Report Number:
S. Hrg. 106-838; Senate Hearing 106-838; Serial No. J-106-79
Publisher:
Date:
2001
Copyright:
Public Domain
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations