Secure and Competitive Intelligence, on and off the Internet

By Lunin, Lois F. | Information Today, March 1995 | Go to article overview

Secure and Competitive Intelligence, on and off the Internet


Lunin, Lois F., Information Today


In February, Internet invader and electronic intruder Kevin Mitnick was brought to ground in Raleigh, North Carolina, by San Diego-based researcher Tsutomu Shimomura and the FBI, in an adventure story that merits a movie script. Mitnick's alleged misdeeds, which include snooping through others' e-mail and stealing credit card numbers from computer systems nationwide, serve to focus the information industry's attention on questions of security and intelligence. These were just the issues explored last November at the Third International Symposium on National Security & National Competitiveness: Open Source Solutions, in Alexandria, Virginia. The meeting was a production of OSS, Inc. (Open Source Solutions).

Business is about survival of companies, nations, and people, according to featured speaker Douglas Bernhardt, Business Research Group SA. Competitive advantage, he said, is to know the enemy. Bernhardt and other business leaders, government officials information professionals, global thinkers, and even some hackers came together at the Symposium to warn an audience of industry people, government officials, and academics of holes in our national and industrial security net.

As a nation, they warned, we are ill prepared to avoid security problems with the vast data we transmit over computer networks, and that leaves us perilously open to competitive disadvantage. Our vulnerability will be even greater as our public use of networks increases, because anyone with moderate technological skill can penetrate our public, commercial, and government data networks. If we do not fundamentally restructure our thinking, disastrous events will force us to do so.

Threats to Governing and Doing Business Safely

Looking at issues of security, Winn Schwartau of INTERPACT, in a talk entitled "Chaos in Cyberspace," said that people don't really even recognize the problem. Our intelligence, military, and commercial systems networks are up and running. If they stop, we have denial of service and a big problem.

We know how to secure systems, Schwartau said. We know about integrity--we have just about solved the problem using encryption-style techniques, and we have the infrastructure to build it in. What we do not have, he observed, are immediate answers or even ideas on implementation.

The future of warfare will be economic and social, according to Schwartau. Attacks will occur on Wall Street, the Federal Reserve System, or other vulnerable areas. When technology is developed, someone somewhere finds how to use it in a malicious way. We must acknowledge the problem now so that there is a chance we can solve it. We need to recognize that the Internet is a real problem as well as a real asset, he advised.

Continuing this theme, Robert D. Steele, founding president of OSS, asserted that information is a strategic asset of the United States today. We must protect it both through policy and through strategy, he said. "The world has changed from a tangible to an intangible virtual world ... And we are inviting attacks (on the information we generate and own)."

There is no safe environment in cyberspace, and in the current system there are no hooks for security, Steele said. In industry, the stockholders of an organization should demand a secure computing environment. In government, the NII needs to be security driven so no denial of services can occur.

The "Hackers" Weigh In

Among the self-described hackers who attended the security and competitiveness symposium, some held their own sessions to discuss capabilities and to target computer system vulnerabilities. (They also took pains to establish a sharp difference between themselves as symposium participants and hackers who destroy data, "immature kids who do not know how to do anything else," according to Emmanuel Goldstein. Goldstein received an OSS Golden Candle Award "in recognition of his awesome feat in bringing together 1400 hackers, cyberpunks, and hacker wannabes at Hackers on Planet Earth (HOPE) in New York City in August last year.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Secure and Competitive Intelligence, on and off the Internet
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.