Info-Tech Industry Targets Diverse Threats: Fears of Network Vulnerability Fuel Market for Improved Security Systems

By Book, Elizabeth G. | National Defense, August 2002 | Go to article overview
Save to active project

Info-Tech Industry Targets Diverse Threats: Fears of Network Vulnerability Fuel Market for Improved Security Systems

Book, Elizabeth G., National Defense

Emerging technologies in the communications and electronics sector should be exploited to fight the war on terrorism, said U.S. officials.

"We need to use all instruments of national power," said Air Force Gen. Richard B. Myers, chairman of the Joint Chiefs of Staff. At a conference of the Armed Forces Communications and Electronics Association, Myers explained that as the United States' means of acquiring information increases, so does its intelligence.

"We hear from some law enforcement official in London, who has seen something, or someone makes an arrest in Morocco. Pretty soon you start to piece this together and connect the dots, and you can take action against financial networks, against the leadership, or rake actions to disrupt the weapons flow," he said. Myers explained that it is currently an arduous process to "put it all together," but with new capabilities and technologies, "we can make the cycle go much faster," he said.

"If you think it's true that this is the most important thing those of us in uniform have ever done ... then we also have got to expect to make some sacrifices," and work harder to thwart another attack, he said.

Shoring up technology in the areas of fiber optics, computer programs, biometrics and network-centric warfare improvements, companies are working to market new products to the Defense Department and U.S. allies.

News reports about al Qaeda's attempts to launch cyber-attacks are likely to spur business opportunities for the network-security industry. Opterna, a Quakertown, Pa.-based company that manufactures fiber optic network equipment, has developed a new technology that can prevent an intrusion based on the hacker's attempt to log onto the network from the fiber optic line, before the intruder even reaches the network. Opterna's Fiber Sentinel system uses artificial intelligence and optical digital signature recognition to monitor fiber connections, and can detect and deal with intrusions, said Michael Cohen, vice president of Global Marketing for Opterna.

"We have seen a tremendous upsurge in interest among government and military customers for a system that can eliminate their fiber optic network vulnerabilities," said Bret Matz, Opterna's president.

After detecting the intrusion, Fiber Sentinel denies access to the intruder, simultaneously re-routes legitimate traffic to a backup fiber path and then notifies the network operator of the intrusion. The system, which has no known competitor, provides continuous, real-time monitoring of the network connections without any disruption of the data stream, said Cohen. Fiber Sentinel identifies such intrusions as Trojan Horses, worms, denial-of-service attacks and other hacking attempts, he said. "The system shuts down the hacker's path in milliseconds."

The company recently completed a proof-of-concept study for the Fiber Sentinel system, and has had favorable reviews from the military users, Cohen said. "Our target markets are embassies, financial services communities, air traffic controllers, the Defense Department, Border Patrol and the White House Communication Agency." Other potential customers are companies concerned about industrial espionage, he said.

Denial-of-Service Attacks

Denial-of-service attacks on computer networks can result in a complete network shutdown, which can cost companies a lot of money and time. "In the national defense business, you've got people in the battlefield," said Ted Julian, chief strategist and co-founder of Arbor Networks, a two-year-old small business based in Lexington, Mass.

"A few minutes of them having no information is completely unacceptable. It's literally a life or death scenario," he said.

Arbor Networks is commercializing a program whose underlying technology was developed at the University of Michigan, with funding from the Defense Advanced Research Projects Agency. The company's flagship product, Peakflow, helps detect, trace and filter denial of service attacks.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Info-Tech Industry Targets Diverse Threats: Fears of Network Vulnerability Fuel Market for Improved Security Systems


Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?