Terminal Compromise - novelonlinefull.com
You’re read light novel Terminal Compromise Part 146 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
The only one that's left. Troubleaux was shot by an Arab . . .the FBI is working hard on that angle. They've given themselves extraordinary covers." Phil was always on top of those things that might have a political cause and/or effect. "How extensive an operation was this?"
Marvin Jacobs ruffled through some notes in his files. "It's hard to be sure. If h.o.m.osoto followed all of Foster's plan, I would guess 3 - 5,000 people, with a cost of between $100 - $300 Mil- lion. But mind you, that's an uneducated guesstimate."
Quinton Chambers dropped his pen on the table. "Are you telling us that one man is bringing the United States virtually to its knees for a couple of hundred million?" Marv reluctantly nodded.
"Gentlemen, this is incredible, more than incredible . . .does the President know?"
Even Phil Musgrave was antsy with the answer to that question.
"Not in any detail, but he is very concerned. As for the cost, terrorism has never been considered expensive."
"Well thank you Ron Ziegler, for that piece of information,"
scowled Chambers. "So if we know all of this, why don't we pick 'em all up and get this over with and everything working again?"
"Foster claims he doesn't know who anyone other than h.o.m.osoto is.
He was kept in the dark. That is certainly not inconsistent with the way h.o.m.osoto is known to do business - very compartmental- ized. He didn't do the recruitment, he said, and all communica- tions were done over the computer . . .no faces, no names. If it wasn't for Mason, we wouldn't even know that Foster is the Spook.
I consider us very lucky on that point alone."
"What are we going to do? What can we do?" Royce and Chambers both sounded and looked more concerned than the others. Their agencies were on the front line and the most visible to the public.
"For the government we can take some mandatory precautions. For the private sector, probably nothing . . ."
"Unless." Phil said quietly.
"Unless what?" All heads turned to Phil Musgrave.
"Unless the President invokes martial law to protect the country and takes control of the computers until we can respond." Phil often thought out loud, even with his extremist possibilities.
"Good idea!" said Jacobs quickly.
"You think that public will buy that?" asked Chambers.
"No, but they may have no choice."
Tuesday, January 26
PRESIDENT DECLARES WAR ON COMPUTERS By Scott Mason
Support for the President's Sunday night call to arms has been virtually unanimous by industry leaders.
According to James Worthington, Director of Computing Services at First National Life, "We take the threat to our computers very seriously. Without the reliable operation of our MIS systems, our customers cannot be serviced and the company will suffer tremendous losses. Rates will undoubtedly rise unless we protect ourselves."
Similar sentiments were echoed by most industry leaders. IBM announced it would be closing all of its computer centers for between two and four weeks to effect a complete cleansing of all systems and products. A spokesperson for IBM said, "If our computers are threatened, we will take all necessary steps to protect our investment and the confidence of our customers. IBM prefers a short term disruption in normal services to a long term failure."
Well placed persons within the government concur that the NSA, who is responsible for guiding the country through the current computer crisis, is ideally suited for managing the situation.
Even agencies who have in the past been critical of the super- secret NSA are praising their preliminary efforts and recommenda- tions to deal with the emergency.
In a several page doc.u.ment issued by the NSA, a series of safe- guards is outlined to protect computers against many of the threats they now face. In addition, the NSA has asked all long distance carriers to, effective immediately, deny service to any digital communications until further notice. Despite high marks for the NSA in other areas, many of their defensive recommenda- tions have not been so well received.
"We are actually receiving more help from the public BBS's and local hacker groups in finding and eradicating the viruses than from the NSA or ECCO," said the Arnold Fullerman, Vice President of Computer Services at Prudential.
AT&T is also critical of the government's efforts. "The Presi- dential Order gives the NSA virtual control over the use of our long distance services. Without the ability to transmit digital data packets, we can expect a severely negative impact on our first quarter earnings . . ." While neither AT&T nor the other long distance carriers indicated they would defy the executive decree, they did say that their attorneys were investigating the legality of the mandate.
The NSA, though, was quick to respond to criticism. "All the NSA and its policies are trying to achieve is a ma.s.sive reduction in the rate of propagation of the h.o.m.osoto Viruses, eliminate fur- ther infection, so we can isolate and immunize as many computers as possible. This will be a short term situation only." De- tractors vocally dispute that argument.
AT&T, Northern TelCom and most telephone manufacturers are taking additional steps in protecting one of h.o.m.osoto's key targets: Public and Private Branch Exchanges, PBX's, or phone switches.
They have all developed additional security recommendations for customers to keep Phone Phreaks from utilizing the circuits without authorization. Telephone fraud alone reached an estimat- ed $14 Billion last year, with the courts upholding that custom- ers whose phones were misused are still liable for all bills.
Large companies have responded by not paying the bills and with lawsuits.
The NSA is further recommending federal legislation to mitigate the effects of future computer attacks. They propose that com- puter security be required by law.
"We feel that it would be prudent to ask the private sector to comply with minimum security levels. The C2 level is easy to reach, and will deter all but the most dedicated a.s.saults. It is our belief that as all cars are manufactured with safety items such as seat belts, all computer should be manufactured with security and information integrity mechanisms in place. C2 level will meet 99% of the public's needs." A spokesman for ECCO, one of the emergency computer organizations working with the NSA explained that such security levels available outside of the highest government levels range from D Level, the weakest, to A Level, the strongest.
It is estimated that compliance with such recommendations will add no more than $50 to the cost of each computer.
The types of organizations that the NSA recommend secure its computers by law is extensive, and is meeting with some vocal opposition:
Companies with more than 6 computers connected in a network or that use remote communications.
Companies which store information about other people or organiza- tions.
All Credit Card merchants.
Companies that do business with local, state or federal agencies.
The entire Federal Government, regardless of data cla.s.sification.
All publicly funded organizations including schools, universi- ties, museums, libraries, research, trade bureaus etc.
Public Access Data Bases and Bulletin Boards.
"It is crazy to believe that 45 million computers could comply with a law like that in under 2 years," said Harry Everett, a Washington D.C. based security consultant. "In 1987 Congress pa.s.sed a law saying that the government had to protect 'sensitive but uncla.s.sified data' to a minimum C2 level by 1992. Look where we are now! Not even close, and now they expect to secure 100 times that many in one tenth the time? No way."
Another critic said, "C2? What a joke. Europe is going by ITSEC and they laugh at the Orange Book. If you're going to make security a law, at least do it right."
NSA also had words for those computers which do not fall under the umbrella of the proposed legislation. Everyone is strongly urged to practice safe computing.
Tuesday, January 26 St. Louis, Missouri
"I'm sorry sir, we can't find you in the computer," the harried young woman said from behind the counter.
"Here's my boarding pa.s.s," he said shoving the small cardboard pa.s.s into her face. "And here's a paid for ticket. I want to get on my flight."
"Sir, there seems to be a complication," she nervously said as she saw at least another hundred angry people behind the irate customer.
"What kind of complication?" he demanded.