SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Guidance and Visibility -- Ignore unavailable to you. Want to Upgrade?


To: 2MAR$ who wrote (16457)9/16/2001 3:54:32 PM
From: keithcray  Respond to of 208838
 
White House reviewing rules governing CIA
September 16, 2001 Posted: 1:53 PM EDT (1753 GMT)




WASHINGTON (CNN) -- Bush administration officials are reviewing all the rules governing CIA and other intelligence activities abroad, ranging from the ban on assassinations to rules mandating that informants be checked for their criminal and human rights records, U.S. Secretary of State Colin Powell told CNN on Sunday.

Powell said the executive order signed in 1976 by President Gerald Ford forbidding assassination "is under review." Critics charge lifting the order would reduce U.S. moral prestige around the world and make U.S. officials from the president down less safe.

Powell said in many respects it will be "an intelligence war ... and a law enforcement war" against the Al Qaeda organization headed by suspected terrorist Osama bin Laden.

U.S. President George W. Bush has named bin Laden as the "prime suspect' in Tuesday's hijacking attacks on New York and Washington that left thousands dead or missing.

Senior Republicans on Capitol Hill told CNN on Wednesday that the rules on checking informants' pasts before hiring them will likely be abolished by legislation, if the executive branch does not act soon.

In a related development Sunday, the chairman of the Senate Intelligence Committee said he plans to introduce a bill creating an "Office of Counter-terrorism" at the White House with broad power to direct the federal government's efforts to fight terrorism.

"We need to have someone who has the ability to establish a national program, allocate resources, and be held accountable for our response against terrorism," said Senate Intelligence Chairman Sen. Bob Graham, D-Florida.

The new office would have powers to direct counter-terrorism efforts patterned after the powers the Office of Drug Control Policy has to direct anti-drug efforts, according Paul Anderson, the spokesman for the Senate Intelligence Committee.

The head of the drug office is often referred to as the "drug czar."

Anderson said the new office would have "broad budget authority" to direct counter-terrorism efforts by various agencies, including the FBI and the CIA.

Graham said he intends to introduce the legislation as soon as Congress reconvenes on Thursday.

Stung by charges in some quarters of a massive intelligence failure, a U.S. intelligence official said "we didn't win this battle, but we will win the war".

The official said the public does not realize how many "hundreds, possibly thousands" of lives have been saved by counter-terrorism efforts in recent years. Former CIA operatives say changing the rules on assassinations or recruiting will not help against the key problem: how hard it is to penetrate terrorist cells.

However, intelligence officials say more money for additional case officers and with which to pay off informants and agents "could certainly help". House Intelligence Committee Chairman Rep. Porter Goss, R-Florida, told CNN he believes U.S. intelligence has been "underfunded and under-resourced" for a decade.



To: 2MAR$ who wrote (16457)9/16/2001 4:14:16 PM
From: Frederick Langford  Read Replies (4) | Respond to of 208838
 
LICENSE TO KILL
by Bernard Lewis
From Foreign Affairs, November/December 1998

--------------------------------------------------------------------------------

On February 23, 1998, Al-Quds al-Arabi, an Arabic newspaper published in London, printed the full text of a "Declaration of the World Islamic Front for Jihad against the Jews and the Crusaders." According to the paper, the statement was faxed to them under the signatures of Usama bin Ladin, the Saudi financier blamed by the United States for masterminding the August bombings of its embassies in East Africa, and the leaders of militant Islamist groups in Egypt, Pakistan, and Bangladesh. The statement -- a magnificent piece of eloquent, at times even poetic Arabic prose -- reveals a version of history that most Westerners will find unfamiliar. Bin Ladin's grievances are not quite what many would expect.

The declaration begins with an exordium quoting the more militant passages in the Quran and the sayings of the Prophet Muhammad, then continues:

"Since God laid down the Arabian peninsula, created its desert, and surrounded it with its seas, no calamity has ever befallen it like these Crusader hosts that have spread in it like locusts, crowding its soil, eating its fruits, and destroying its verdure; and this at a time when the nations contend against the Muslims like diners jostling around a bowl of food."

The statement goes on to talk of the need to understand the situation and act to rectify it. The facts, it says, are known to everyone and fall under three main headings:

"First -- For more than seven years the United States is occupying the lands of Islam in the holiest of its territories, Arabia, plundering its riches, overwhelming its rulers, humiliating its people, threatening its neighbors, and using its bases in the peninsula as a spearhead to fight against the neighboring Islamic peoples.

Though some in the past have disputed the true nature of this occupation, the people of Arabia in their entirety have now recognized it.

There is no better proof of this than the continuing American aggression against the Iraqi people, launched from Arabia despite its rulers, who all oppose the use of their territories for this purpose but are subjugated.

Second -- Despite the immense destruc tion inflicted on the Iraqi people at the hands of the Crusader-Jewish alliance and in spite of the appalling number of dead, exceeding a million, the Americans nevertheless, in spite of all this, are trying once more to repeat this dreadful slaughter. It seems that the long blockade following after a fierce war, the dismemberment and the destruction are not enough for them. So they come again today to destroy what remains of this people and to humiliate their Muslim neighbors.

Third -- While the purposes of the Americans in these wars are religious and economic, they also serve the petty state of the Jews, to divert attention from their occupation of Jerusalem and their killing of Muslims in it.

There is no better proof of all this than their eagerness to destroy Iraq, the strongest of the neighboring Arab states, and their attempt to dismember all the states of the region, such as Iraq and Saudi Arabia and Egypt and Sudan, into petty states, whose division and weakness would ensure the survival of Israel and the continuation of the calamitous Crusader occupation of the lands of Arabia."


foreignaffairs.org

Fred



To: 2MAR$ who wrote (16457)9/16/2001 4:22:39 PM
From: keithcray  Respond to of 208838
 
Next? Cyber attacks on Communication Systems and Computers. Such Attacks could shut down water systems, power plants, railroads, airports, and oil and gas pipelines, all of which run on computer and communications systems. Each system is usually controlled by a central, vulnerable location.

Companies warned about possible cyberattacks
From...

September 13, 2001 Posted: 8:33 a.m. EDT (1233 GMT)



--------------------------------------------------------------------------------




--------------------------------------------------------------------------------

By Dan Verton and Bob Brewin

(IDG) -- Government and private-sector security experts fear that Tuesday's attacks against the World Trade Center and the Pentagon are only the beginning of a wave of assaults that could include cyberterrorism.

Officials at the FBI's National Infrastructure Protection Center (NIPC), located at FBI headquarters, gathered for an emergency meeting to collect and analyze all available cyberintelligence information, said Navy Rear Adm. James Plehal, the deputy director of the NIPC.

Meanwhile, Marv Langston, former deputy CIO at the Defense Department, viewed Tuesday's terrorist attacks as an act of war and warned that they could be followed by a series of cyberattacks. Langston said the U.S. needs to prepare itself for what he described as an "electronic Pearl Harbor."

Air Force Lt. Gen. Retired Al Edmonds, now head of the Electronic Data Systems Inc., federal division, said "I would suspect a cyberattack could be next, and that would be absolutely paralyzing."

In the 1990s, the Pentagon produced a series of studies that showed that a cyberattack on computer and communication systems could cripple the U.S. as severely as a physical attack. Such an attack could shut down water systems, power plants, railroads, airports, and oil and gas pipelines, all of which run on computer and communications systems. Each system is usually controlled by a central, vulnerable location.

But Jeff Moss, president and CEO of Black Hat Briefings, a security consulting firm in Seattle, said he hasn't discovered a cyber component to Tuesday's attacks. "People are watching their logs, but from what I can tell nobody has seen anything yet." Moss is the founder of the annual Def Con hacker conference.

"Today (Tuesday) will be security review day for a lot of places," said Moss.

Also, Atlanta-based Internet Security Systems Inc. (ISS), which operates the IT sector's Information Sharing and Analysis Center (ISAC), placed its operations center on what it calls AlertCon 3 (the highest is AlertCon 4), "in order to focus IT security efforts on the potential for (and defense against) an Internet component to these attacks." The ISAC works in cooperation with the FBI and the NIPC in sharing information about cyberthreats.

"Our monitored networks do not show any unusual activity at this time, but our [Security Operations Centers] are at a heightened state of alert as we watch for any indications that e-commerce is also being targeted," an ISS spokesman said. The financial district around Wall Street in lower Manhattan was closed down.

"This is a time to partner all security assets on what is most important to your enterprise," the ISS threat assessment states. "While physical security concerns are paramount, it is essential to keep some eyes on the networks focused on malicious activity. We can expect a significant increase in disaster-recovery activity -- plans being activated, dusted off, etc. No doubt the [disaster-recovery] industry will be sorely stressed at this point, and it would behoove staffs to consider security as a move to alternate sites is contemplated or enacted."

The major question being asked by some experts is how such a large-scale, coordinated attack could have been accomplished without security officials being tipped off through cyber or communications intelligence. Most experts acknowledge, however, that there are only a handful of terrorist organizations in the world capable of conducting such an operation in secret. And they likely used nontechnical means of communications that would have allowed them to escape U.S. intelligence IT surveillance operations.

John Garber, vice president of Cryptec Secure Communications in Chantilly, Va., and a former National Security Agency official, said the capabilities of the U.S. intelligence community are "fairly well known" by the terrorist organizations that are suspects in this series of attacks.

"They do an awful lot of communications through messengers and nondigital methods," said Garber. "It's not like them to be walking around talking on telephones. This doesn't strike me as a signals intelligence failure as much as a failure of national [agency] coordination," he said.

"This is a large and extremely well-coordinated attack. In spite of our best efforts to coordinate intelligence collection on terrorists, this is a massive failure of national cooperation," said Garber, who was in downtown Washington when the Pentagon was attacked. "I can't believe there were no indications."

Edmonds, who ran the Defense Information Systems agency, which operates the Pentagonâs global networks and which has a key role in the Defense Departmentâs cberdefense, said that anyone running an enterprise network today needs to be extremely vigilant against cyberattacks.

cnn.com