?
Solved

Information Security After September 11th

Posted on 2003-02-24
5
Medium Priority
?
212 Views
Last Modified: 2010-04-11
I am doing some research about how the incidents of September 11th have changed IA (Information Assurance)   I am having a hard time finding any sources that would relate to this topic. Can anyone help me?
0
Comment
Question by:freejaso
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 24

Accepted Solution

by:
SunBow earned 800 total points
ID: 8018795
I'll defer lrmoore links an make hasty claim that:
1) It is difficult since there are too many references to 9/11, for better or worse
2) The real answer is that there's no change in that respect. People were doing off-site storage, companies maintaining multiple sites, etc. So IMO there's not much news there on things getting any different.

But there has been IMO a noticeable impact on industry due to observations on 9/11. I am not sure if companies involved are bragging on it being 9/11 relevant, for that is in bad taste. But here's my take, and much is based on internet sources I did not bookmark:

3) Communicating verbally: you had choices about telephone, pager, cell phone, and voice/IP. While in some cases cell phones had outages, their superiority was clearly demonstrated for a 9-11 type event, and the event IMO did have impetus on both the use of cell phones and in the providers of services increasing the ranges covered and in cooperations.

4) While mirror sites can benefit such a situation, I think the 9/11 has not impacted such. I think people put up mirros still for same reasons as before, but one internetting activity that has changed is corporate view on eMail. When phones were out, eMail still got through in many cases. And companies noticed. To shoe that up there were and are at least three changes that we can say had impetus from 9/11. One is now accepted, and that is use of remote eMail devices such as BlackBerry, and for how robust such device may be. This function is providing limited eMail functionality without direct connection. The other two are what I would call being 'explored', not necessarily accepted yet. One is the wireless networking, and the other the corporate use of IM.

5) One could make a claim about mainframes, but I see people going back to mainframes and moving away from mainframes both for same old reasons as before, nothing inherrent on a 9/11 impact.

----------

6) I think most anything you could find on " how the incidents of September 11th have changed IA (Information Assurance)" that is other that I described above would be issue I likely to disagree with, presuming most of that plain PR for some product or author or other.
0
 

Author Comment

by:freejaso
ID: 8037180
I have to agree with SunBow. The more I look into this the less I see.

Here is another question? I have been looking into cyber warfare. Is anyone aware of any information on how forces have used this against an enemy? Since the US goverment has never used cyber warfare on a large scale, I have been unable to uncover much about it.
0
 
LVL 24

Expert Comment

by:SunBow
ID: 8092338
Thanx.                      -Good Fortune-

er, question's over, for other questions post another (or you may not get proper audience). What the hay,

Cyber Warfare: first, exercise care in what you 'assume' about what you do not know - why would a gov't admit to it to you?

Over the past several years there's been a dramatic increase in both private and public sector hiring of hackers (or attempts to do so, most hackers have honor).

Do know that most gov's are embodied with regular people, who don't have understanding of hacking, and mistrusts the ones who do.

While you'd need to define terms of warfare and large, do recognize that if there really were such a phenomenon for any country, the turf involved includes more than Cloak&Dagger SpyWars, such that many of your fellow humans have taken license of a J.Bond. So if you value your NakedLife, you should want to not know certain things.
0
 
LVL 24

Expert Comment

by:SunBow
ID: 8113961
(apologies in advance if any links toss out their version of extra popup ads)

> US goverment has never used cyber warfare

Oh, but it has. Does. Will. Surely.

Most popular rendition could be the Printer Virus run in Mid-East. Originally tag "NSA printer virus (1991)" in free media stories, it now has secret updates through at least 1992 that are only available to elite willing to pay big bucks. Even cracker sites like 2600 hold this information close, not just for anyone. Sites may charge even $5USD for the secret info. But for you? OK, See also:

http://www.youdzone.com/cryptobooks_InformationWarfare.html

NSA printer virus (1991)
http://www.vmyths.com/hoax.cfm?id=123&page=3

http://cypherpunks.venona.com/date/1997/05/msg00643.html

Here's a secret snapshot of one of US' secret agents in cyber warfare. Don't tell anyone. While the agent specializes in hanging out in eastern europe, The Agent's secret sources lead him to travel to important events, and with super skills to survive, will resurface to get involved in other events. I wouldn't tell you either, but it is common knowledge in EE, and you're capable of searching this out on your own:

http://www.loxoo.com/photos/people/touristofdead/touristofdead.html
http://www.loxoo.com/photos/people/touristofdead/wtcspeed.jpg

So you see, the US legal system has been incorrect where it has been continually claiming for two decades now that Promis of cyber-warfare has been unrealized. For example, DOJ reports "no way":

http://www.usdoj.gov/opa/pr/1997/August97/323civ.htm
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question