Department of Defense Authorization for Appropriations for Fiscal Year 2001 and the Future Years Defense Program: Hearings Before the Committee on Armed Services, United States Senate, One Hundred Sixth Congress, Second Session, on S. 2549 ....U.S. Government Printing Office, 2000 |
From inside the book
Results 1-5 of 72
Page 32
... missile attacks and so forth . We clearly need to increase that for the cyber attacks . If you would look at this chart over here , this is a display of what we call Defense in Depth . It is a very simplistic view , but between the ...
... missile attacks and so forth . We clearly need to increase that for the cyber attacks . If you would look at this chart over here , this is a display of what we call Defense in Depth . It is a very simplistic view , but between the ...
Page 142
... missiles , launchers and bombers , in the former Soviet Union have had a demonstrable threat reduction impact , particularly in Ukraine and Kazakhstan . These efforts have played a crucial role in eliminating the threat from these ...
... missiles , launchers and bombers , in the former Soviet Union have had a demonstrable threat reduction impact , particularly in Ukraine and Kazakhstan . These efforts have played a crucial role in eliminating the threat from these ...
Page 144
... missile launchers . Most of these programs , however , are inherently a cost risk in that we may never be able to ... missiles and bombers ) for delivering weapons of mass destruction . It also had numerous facilities employing hundreds ...
... missile launchers . Most of these programs , however , are inherently a cost risk in that we may never be able to ... missiles and bombers ) for delivering weapons of mass destruction . It also had numerous facilities employing hundreds ...
Page 146
... missiles , missile silos and submarines which can be easily seen by U.S. personnel . The programs involved generally good working relationships with key ministries and officials . • In the case of Ukraine and Kazakhstan , the recipients ...
... missiles , missile silos and submarines which can be easily seen by U.S. personnel . The programs involved generally good working relationships with key ministries and officials . • In the case of Ukraine and Kazakhstan , the recipients ...
Page 152
... missiles , 12 ballistic missile carrying submarines with 176 missile launchers on them , and almost 60 heavy bombers . We are persuaded that without CTR assistance , most of those weapons would have continued to exist . Those ...
... missiles , 12 ballistic missile carrying submarines with 176 missile launchers on them , and almost 60 heavy bombers . We are persuaded that without CTR assistance , most of those weapons would have continued to exist . Those ...
Other editions - View all
Common terms and phrases
A-list acquisition Admiral GEHMAN agencies Air Force areas Army attack biological budget capabilities Center CERT Coordination Center CERT/CC Chairman CINCs Civil Support Cold War combating terrorism commercial consequence management critical infrastructure cyber DARPA demonstrate Department of Defense DOD's efforts ensure facilities Federal fiscal year 2001 funding future global going improve industry information assurance initial integrated Internet interoperability investment issues Joint Forces Command JROC Kosovo laboratories mass destruction Mayak ment military million missile mission MPC&A national security Navy NIPC nology nuclear material nuclear weapons operations PAT ROBERTS percent personnel plutonium problems protection red teaming reduce requirements response Russian S&T Program science and technology Secretary of Defense sector Senator BINGAMAN Senator LIEBERMAN Senator ROBERTS sensors Services strategy subcommittee target tech terrorist Threat Reduction tion U.S. Joint Forces vulnerabilities weapons of mass
Popular passages
Page 220 - ... agency" means an Executive agency, the Administrative Office of the United States Courts, and the Government Printing Office, but does not include — (i) a Government corporation; (ii) the Federal Bureau of Investigation, the Central Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, and...
Page 67 - It is critical to maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches.
Page 16 - Terrorists groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and to communicate securely.
Page 61 - CERT/CC has seen an increase in the development and use of distributed sniffers, scanners, and denial-of-service tools. Attacks using these tools can involve a large number of sites simultaneously and be focused to attack one or more victim hosts or networks. Damaged systems include those used in the attack as well as the targeted victim. For the victim, the impact can be extensive. For example, in a denial-of-service attack using distributed technology, the attacked system observes simultaneous...
Page 395 - Consequence management" refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism...
Page 16 - Cyber terrorism' — by which I mean the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population — is thus a very real, though still largely potential, threat.
Page 14 - Insider threat The disgruntled organization insider is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a victim system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors. Virus writers Virus writers are posing an increasingly serious threat. Several destructive computer viruses and "worms" have harmed files...
Page 64 - Internet is designed to allow packets to flow easily across geographical, administrative, and political boundaries. Consequently, cooperation in tracing a single attack may involve multiple organizations and jurisdictions, most of which are not directly affected by the attack and may have little incentive to invest time and resources in the effort. This means that it is easy for an adversary to use a foreign site to launch attacks at US systems. The attacker enjoys the added safety of the need for...
Page 16 - information warfare" by foreign militaries against our critical infrastructures is perhaps the greatest potential cyber threat to our national security. We know that several foreign nations are developing information warfare doctrine, programs, and capabilities for use against the United States or other nations. Knowing that they cannot match our military might with conventional or "kinetic...
Page 173 - IPP program works to secure weapons of mass destruction expertise and know-how. Since the program's inception in 1994, more than 6,000 weapons scientists in Russia and the Newly Independent States have been supported through 400 non-military projects. The program partners Russian and NIS scientists with specialists at the Department's national laboratories and concentrates aggressively on the commercialization of projects that are cost-shared with US industry.