08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

weapons and poison gas. Nations can site the use of an information weapon to<br />

suspend, modify, or terminate certain treaties related to indiscriminate weapons,<br />

since “a fundamental change of circumstances may justify a party to regard its<br />

treaty obligations as suspended or terminated.” 558<br />

Possible Future Law Enforcement Techniques<br />

There are several techniques that law enforcement agencies can use to<br />

intervene in the contents of international networks, but each must be<br />

coordinated with the appropriate authorities of the network and country<br />

concerned. The urgency of protecting critical infrastructure may in fact push the<br />

development of a properly designed active defense concept that is “precleared”<br />

by the courts for action. 559<br />

Computer systems may be developed that prevent the sabotage or<br />

destruction of friendly systems. As computers are unbounded systems, “no one<br />

has complete and precise knowledge of the topology or state of the system.<br />

Central control is nonexistent or ineffective.” 560 Programming pioneer David<br />

Fischer developed just such a system, known as Easel, to work around<br />

unbounded systems such as the power grid. Easel can perform abstract<br />

reasoning easier than older programming methods. This allows Easel to predict<br />

how a new cyberpathogen or software bug might cripple a system. Law<br />

enforcement agencies would benefit from his expertise.<br />

Closer cooperation between the National Institute for Standards and<br />

Testing’s Information Technology Laboratory (ITL, mentioned earlier) with<br />

law enforcement agencies is another way to increase law enforcement<br />

techniques. There has been past cooperation. For example, the ITL’s National<br />

Software Reference Library compares the files’ electronic “fingerprints” to<br />

those in its database, allowing investigators to focus on suspicious or unknown<br />

files identified during a sweep. This automatically eliminates 40-95% of the<br />

files, and saves hundreds of man-hours. ITL also is working to protect the<br />

Internet Infrastructure from cyber terrorism, and it just helped develop the<br />

Advanced Encryption Standard for protecting sensitive, nonclassified<br />

information. The computer security division recently put out guidelines for<br />

federal agencies on risk management and contingency planning. Finally, work<br />

is being done to strengthen the security of the domain name system since the<br />

558 Ibid., p. 39.<br />

559 Ibid., p. 54.<br />

560 W. Wayt Gibbs, “Survival in an Insecure World,” Scientific American, May 2002, p.<br />

39.<br />

334

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!