[ISN] Kellogg describes cyber battlefield

From: InfoSec News (isnat_private)
Date: Thu Mar 06 2003 - 03:07:57 PST

  • Next message: InfoSec News: "[ISN] School hacker won't be expelled"

    Forwarded from: William Knowles <wkat_private>
    By Dan Caterinicchia 
    March 5, 2003
    The war on terrorism is being fought not only in places such as
    Afghanistan and Pakistan, but also on a cyber battlefield where
    terrorists are using information technology to their advantage.
    However, the Defense Department is also using IT and is attempting to
    "connect the dots" before the next attack is carried out, according to
    one member of the Joint Staff.
    Army Lt. Gen. Joseph Kellogg Jr., director of command, control,
    communications and computers for the Joint Staff, said the cryptology
    being used by terrorists to protect their data and communications is
    as good, if not better, than DOD's solutions.
    He added that terrorists also have the capability to use steganography
    to pass instructions and other information. Steganography involves
    hiding a message or image within another image, a sound file (or
    musical composition) or some other unlikely document location.
    "They are hiding stuff in pictures and embedding them in places we
    can't get to...like porn sites," Kellogg said during a March 5 panel
    at the Homeland and Global Security Summit in Washington, D.C.
    DOD also is leveraging IT to "connect the dots" to ensure that there
    is never a repeat of the type of terrorist attacks that occurred Sept.  
    11, 2001, he said. "The best counter in asymmetric war is information
    and how you use it."
    Asymmetric warfare is any means by which a generally inferior force
    can gain advantage over mightier opponents. On the asymmetric
    battlefield, Kellogg said, "The primary [thing terrorists] are using
    to their advantage is information technology."
    In an interview with FCW, Kellogg made clear that no DOD personnel are
    accessing porn sites looking for hidden terrorist messages. But he
    added that other government agencies and organizations are able to do
    it and that DOD would use and act on any "legally vetted information"  
    that is uncovered.
    Kellogg also said that last week's capture of al Qaeda operations
    chief Khalid Shaikh Mohammed was significant not only because he is in
    custody and can be interrogated, but also because "they got his
    computers," and even deleted files may hold valuable information for
    DOD and intelligence agencies.
    Northern Command (Northcom), which is responsible for ensuring
    homeland defense capabilities and supporting civilian authorities when
    directed by the president or secretary of Defense, doesn't yet have
    the integrated battle command capabilities of its fellow worldwide DOD
    combatant commands, but IT solutions are starting to make it happen,
    Kellogg said.
    He added that Northcom must share information with all of the military
    services and DOD agencies as well as federal agencies and state and
    local law enforcement and first responders, which makes the task even
    Northcom will have about 600 people at its headquarters at Peterson
    Air Force Base, Colorado Springs, Colo., when it achieves full
    operational capability Oct. 1, said Air Force Brig. Gen. Lloyd Dodd,
    the command's chief surgeon. He added that as of last week, the
    headquarters staff included 258 people.
    "Communications without intelligence is noise;  Intelligence
    without communications is irrelevant." Gen Alfred. M. Gray, USMC
    C4I.org - Computer Security, & Intelligence - http://www.c4i.org
    ISN is currently hosted by Attrition.org
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.

    This archive was generated by hypermail 2b30 : Thu Mar 06 2003 - 05:36:17 PST