Department of Defense Authorization for Appropriations for Fiscal Year 2001 and the Future Years Defense Program: Hearings Before the Committee on Armed Services, United States Senate, One Hundred Sixth Congress, Second Session, on S. 2549 ....U.S. Government Printing Office, 2000 |
From inside the book
Results 1-5 of 82
Page
... Army for Research , Develop- ment , and Acquisition 282 Buchanan , Dr. H. Lee , III , Assistant Secretary of the Navy for Research , Development , and Acquisition 288 Delaney , Hon . Lawrence J. , Assistant Secretary of the Air Force ...
... Army for Research , Develop- ment , and Acquisition 282 Buchanan , Dr. H. Lee , III , Assistant Secretary of the Navy for Research , Development , and Acquisition 288 Delaney , Hon . Lawrence J. , Assistant Secretary of the Air Force ...
Page 19
... Army ; and our Military Liaison is a detailee from the U.S. Navy . In addition , we have program managers , watchstanders , investigators , and analysts detailed from several other DOD compo- nents including the National Security Agency ...
... Army ; and our Military Liaison is a detailee from the U.S. Navy . In addition , we have program managers , watchstanders , investigators , and analysts detailed from several other DOD compo- nents including the National Security Agency ...
Page 53
... Army , Navy , and Air Force , which is not in the cards , nor do I think we should waste our time even thinking about that , this is a cross - cutting issue . I am using the CIOS of all of those entities to come together to work the ...
... Army , Navy , and Air Force , which is not in the cards , nor do I think we should waste our time even thinking about that , this is a cross - cutting issue . I am using the CIOS of all of those entities to come together to work the ...
Page 82
... Army are sponsors of the DOD C3I FFRDC . This Center supports the National security and intelligence community with technical work on command , con- trol , communications , computers , intelligence , surveillance and reconnaissance , by ...
... Army are sponsors of the DOD C3I FFRDC . This Center supports the National security and intelligence community with technical work on command , con- trol , communications , computers , intelligence , surveillance and reconnaissance , by ...
Page 86
... Army's Task Force XXI exercises , the Joint Expeditionary Force Experiments , and many others . Of particular note is the Fort Franklin V ( FFV ) exercise in 1996. Conducted at the Air Force Electronic Systems Center ( ESC ) , the Fort ...
... Army's Task Force XXI exercises , the Joint Expeditionary Force Experiments , and many others . Of particular note is the Fort Franklin V ( FFV ) exercise in 1996. Conducted at the Air Force Electronic Systems Center ( ESC ) , the Fort ...
Other editions - View all
Common terms and phrases
A-list acquisition Admiral GEHMAN agencies Air Force areas Army attack biological budget capabilities Center CERT Coordination Center CERT/CC Chairman CINCs Civil Support Cold War combating terrorism commercial consequence management critical infrastructure cyber DARPA demonstrate Department of Defense DOD's efforts ensure facilities Federal fiscal year 2001 funding future global going improve industry information assurance initial integrated Internet interoperability investment issues Joint Forces Command JROC Kosovo laboratories mass destruction Mayak ment military million missile mission MPC&A national security Navy NIPC nology nuclear material nuclear weapons operations PAT ROBERTS percent personnel plutonium problems protection red teaming reduce requirements response Russian S&T Program science and technology Secretary of Defense sector Senator BINGAMAN Senator LIEBERMAN Senator ROBERTS sensors Services strategy subcommittee target tech terrorist Threat Reduction tion U.S. Joint Forces vulnerabilities weapons of mass
Popular passages
Page 220 - ... agency" means an Executive agency, the Administrative Office of the United States Courts, and the Government Printing Office, but does not include — (i) a Government corporation; (ii) the Federal Bureau of Investigation, the Central Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, and...
Page 67 - It is critical to maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches.
Page 16 - Terrorists groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and to communicate securely.
Page 61 - CERT/CC has seen an increase in the development and use of distributed sniffers, scanners, and denial-of-service tools. Attacks using these tools can involve a large number of sites simultaneously and be focused to attack one or more victim hosts or networks. Damaged systems include those used in the attack as well as the targeted victim. For the victim, the impact can be extensive. For example, in a denial-of-service attack using distributed technology, the attacked system observes simultaneous...
Page 395 - Consequence management" refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism...
Page 16 - Cyber terrorism' — by which I mean the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population — is thus a very real, though still largely potential, threat.
Page 14 - Insider threat The disgruntled organization insider is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a victim system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors. Virus writers Virus writers are posing an increasingly serious threat. Several destructive computer viruses and "worms" have harmed files...
Page 64 - Internet is designed to allow packets to flow easily across geographical, administrative, and political boundaries. Consequently, cooperation in tracing a single attack may involve multiple organizations and jurisdictions, most of which are not directly affected by the attack and may have little incentive to invest time and resources in the effort. This means that it is easy for an adversary to use a foreign site to launch attacks at US systems. The attacker enjoys the added safety of the need for...
Page 16 - information warfare" by foreign militaries against our critical infrastructures is perhaps the greatest potential cyber threat to our national security. We know that several foreign nations are developing information warfare doctrine, programs, and capabilities for use against the United States or other nations. Knowing that they cannot match our military might with conventional or "kinetic...
Page 173 - IPP program works to secure weapons of mass destruction expertise and know-how. Since the program's inception in 1994, more than 6,000 weapons scientists in Russia and the Newly Independent States have been supported through 400 non-military projects. The program partners Russian and NIS scientists with specialists at the Department's national laboratories and concentrates aggressively on the commercialization of projects that are cost-shared with US industry.