dr wooo on Mon, 2 Aug 1999 05:02:43 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> us gov, monitoring of computer systems |
> New York Times > > July 28, 1999 > > U.S. Drafting Plan for Computer Monitoring System > > By JOHN MARKOFF > > The Clinton Administration has developed a plan for an extensive > computer monitoring system, overseen by the Federal Bureau of > Investigation, to protect the nation's crucial data networks from > intruders. > > The plan, an outgrowth of the Administration's anti-terrorism program, > has already raised concerns from civil liberties groups. > > A draft prepared by officials at the National Security Council last > month, which was provided to The New York Times by a civil liberties > group, calls for a sophisticated software system to monitor activities > on nonmilitary Government networks and a separate system to track > networks used in crucial industries like banking, telecommunications and > transportation. > > The effort, whose details are still being debated within the > Administration, is intended to alert law enforcement officials to > attacks that might cripple Government operations or the nation's > economy. > > But because of the increasing power of the nation's computers and their > emerging role as a backbone of the country's commerce, politics and > culture, critics of the proposed system say it could become a building > block for a surveillance infrastructure with great potential for misuse. > > They also argue that such a network of monitoring programs could itself > be open to security breaches, giving intruders or unauthorized users a > vast window into Government and corporate computer systems. > > Government officials said the changing nature of military threats in the > information age had altered the nature of national security concerns and > created a new sense of urgency to protect the nation's information > infrastructure. > > "Our concern about an organized cyberattack has escalated dramatically," > Jeffrey Hunker, the National Security Council's director of information > protection, who is overseeing the plan, said Tuesday. "We do know of a > number of hostile foreign governments that are developing sophisticated > and well-organized offensive cyber attack capabilities, and we have good > reason to believe that terrorists may be developing similar > capabilities." > > As part of the plan, networks of thousands of software monitoring > programs would constantly track computer activities looking for > indications of computer network intrusions and other illegal acts. > > The plan calls for the creation of a Federal Intrusion Detection > Network, or Fidnet, and specifies that the data it collects will be > gathered at the National Infrastructure Protection Center, an > interagency task force housed at the Federal Bureau of Investigation. > > Such a system, to be put fully in place by 2003, is meant to permit > Government security experts to track "patterns of patterns" of > information and respond in a coordinated manner against intruders and > terrorists. > > The plan focuses on monitoring data flowing over Government and national > computer networks. That means the systems would potentially have access > to computer-to-computer communications like electronic mail and other > documents, computer programs and remote log-ins. > > But an increasing percentage of network traffic, like banking and > financial information, is routinely encrypted and would not be visible > to the monitor software. Government officials argue that they are not > interested in eavesdropping, but rather are looking for patterns of > behavior that suggest illegal activity. > > Over the last three years, the Pentagon has begun to string together > entire network surveillance systems using filters that report data to a > central site, much as a burglar alarm might be reported at the local > police station. > > Officials said such a system might have protected against intrusions > recently reported in computers at the Bureau of Labor Statistics, which > produces information like the consumer price index that can affect the > performance of the stock market. > > The draft of the plan, which has been circulated widely within the > executive branch, has generated concern among some officials over its > privacy implications. Several officials involved in the debate over the > plan said that the situation was "fluid" and that many aspects were > still not final. > > The report is vague on several crucial points, including the kinds of > data to be collected and the specific Federal and corporate computer > networks to be monitored. The report also lacks details about the ways > information collected in non-Governmental agencies would be maintained > and under what conditions it would be made available to law enforcement > personnel. > > Government officials said that the National Security Council was > conducting a legal and technical review of the plan and that a final > version is to be released in September, subject to President Clinton's > approval. > > The plan was created in response to a Presidential directive in May 1998 > requiring the Executive Branch to review the vulnerabilities of the > Federal Government's computer systems in order to become a "model of > information and security." > > In a cover letter to the draft Clinton writes: "A concerted attack on > the computers of any one of our key economic sectors or Governmental > agencies could have catastrophic effects." > > But the plan strikes at the heart of a growing controversy over how to > protect the nation's computer systems while also protecting civil > liberties -- particularly since it would put a new and powerful tool > into the hands of the F.B.I. > > Increasingly, data flowing over the Internet is becoming a vital tool > for law enforcement, and civil liberties experts said law enforcement > agencies would be under great temptation to expand the use of the > information in pursuit of suspected criminals. > > The draft of the plan "clearly recognizes the civil liberties > implications," said James X. Dempsey, staff counsel for the Center for > Democracy and Technology, a Washington civil liberties group, "But it > brushes them away." > > The draft states that because Government employees, like those of many > private companies, must consent to the monitoring of their computer > activities, "the collection of certain data identified as anomalous > activity or a suspicious event would not be considered a privacy issue." > > Dempsey conceded the legal validity of the point, but said there was > tremendous potential for abuse. > > "My main concern is that Fidnet is an ill-defined monitoring system of > potentially broad sweep," he said. "It seems to place monitoring and > surveillance at the center of the Government's response to a problem > that is not well suited to such measures." > > The Federal Government is making a concerted effort to insure that civil > liberties and privacy rights are not violated by the plan, Hunker said. > > He said that data gathered from non-Government computer networks will be > collected separately from the F.B.I.-controlled monitoring system at a > separate location within a General Services Administration building. He > said that was done to keep non-Government data at arm's length from law > enforcement. > > The plan also has drawn concern from civil libertarians because it > blends civilian and military functions in protecting the nation's > computer networks. The draft notes that there is already a Department of > Defense "contingent" working at the F.B.I.'s infrastructure protection > center to integrate intelligence, counterintelligence and law > enforcement efforts in protecting Pentagon computers. > > "The fight over this could make the fight over encryption look like > nothing," said Mary Culnan, a professor at Georgetown University who > served on a Presidential commission whose work led to the May 1998 > directive on infrastructure protection. > > "The conceptual problem is that there are people running this program > who don't understand how citizens feel about privacy in cyberspace." > > The Government has been discussing the proposal widely with a number of > industry security committees and associations in recent months. > > Several industry executives said there is still reluctance on the part > of industry to directly share information on computer intrusions with > law enforcement. > > "They want to control the decision making process," said Mark Rasch, > vice president and general counsel of Global Integrity, a company in > Reston, Va., coordinating computer security for the financial services > industries. > > One potential problem in carrying out the Government's plan is that > intrusion-detection software technology is still immature, industry > executives said. > > "The commercial intrusion detection systems are not ready for prime > time," said Peter Neumann, a computer scientist at SRI International in > Menlo Park, Calif., and a pioneer in the field of intrusion detection > systems. > > Current systems tend to generate false alarms and thus require many > skilled operators. > > But a significant portion of the $1.4 billion the Clinton Administration > has requested for computer security for fiscal year 2000 is intended to > be spent on research, and Government officials said they were hopeful > that the planned effort would be able to rely on automated detection > technologies and on artificial intelligence capabilities. > > For several years computer security specialists have used software > variously known as packet filters, or "sniffers," as monitoring devices > to track computer intruders. Like telephone wiretaps, such tools can be > used to reconstruct the activities of a computer user as if a videotape > were made of his computer display. > > At the same time, however, the software tools are routinely misused by > illicit computer network users in stealing information such as passwords > or other data. > > Commercial vendors are beginning to sell monitoring tools that combine > packet filtering with more sophisticated and automated intrusion > detection software that tries to detect abuse by looking for behavior > patterns or certain sequences of commands. > > > > --------- End Forwarded Message --------- > > > > *********************************** > chickclick.com > http://www.chickclick.com > girl sites that don't fake it. > http://www.chickmail.com > sign up for your free email. > *********************************** > > --------- End Forwarded Message --------- > > > > Angelfire for your free web-based e-mail. http://www.angelfire.com > > > ______________________________________________________________________ > To unsubscribe, write to no2wto-unsubscribe@listbot.com > MSN Messenger Service lets you stay in touch instantly with > your family & friends - Visit http://messenger.msn.com ________________________________________________________________ Get FREE voicemail, fax and email at http://voicemail.excite.com Talk online at http://voicechat.excite.com # distributed via nettime-l: no commercial use without permission of author # <nettime> is a moderated mailinglist for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body # un/subscribe: majordomo@bbs.thing.net and # "un/subscribe nettime-l you@address" in the msg body # archive: http://www.nettime.org/ contact: <nettime@bbs.thing.net>