http://www.infowar.com/class_3/99/class3_012899a_j.shtml

1/28/99
Scientists Look to Combat Cyber-terror
By JOE WARMINSKY

WASHINGTON, Jan. 26 (UPI) -- The cyber-jungle may be inhabited by some
mischievous, predatorial and downright nasty folks, but U.S.  government
scientists have plenty of their own crafty weapons in the works. 

Speaking at a conference on cyber-terrorism today in Washington, Terry
Hawkins of the Los Alamos National Laboratory explained several
high-concept hardware and software developments that could help defend
vulnerable U.S. computer networks. 

There are myriad ways that hackers can infiltrate business and government
systems, including password guessers and crackers;  software "back doors"
left by programmers; "sniffers" that allow interlopers to read passwords
as they whiz by in cyberspace; and "spoofing," or masquerading as another
user. 

The government doesn't expect to close all the cracks, Hawkins said, but
it wants to avoid a true incident of cyber-terrorism that would cripple a
major industry -- such as electric utilities or airlines -- or shut down a
key military system. 

In the search for security, researchers are working on computer gear that
controls data using extremely small or complex means, said Hawkins, the
director of Los Alamos's Nonproliferation and International Security
Division. If we can't stop hackers or cyber-terrorists, then we can at
least detect them quickly or find ways to easily repair the damage they
cause. 

Among the concepts are: 

--Quantum encryption. Scientists are perfecting ways to use single photons
-- the particles that make up light -- to carry encrypted messages down
fiber-optic tubes. If a photon is interrupted, it can't be sent on its way
again without appearing differently at the other end. Hawkins said,
"There's no hacker that can violate the laws of physics." 

--Quantum computing. Whereas even the smallest, fastest computer chips
require flows of multiple electrons through their silicon pathways, the
Los Alamos scientists are working on computers that would use single
electrons or lone calcium ions to do their calculations. These computers
would have intensely high encryption powers. 

--Biologically inspired systems. When organisms fight off intruders such
as viruses and bacteria, their cells adapt to provide immunity in most
cases. Hawkins said computers could be given "mutable" protection measures
that would "learn" to rebuff hackers the same way. 

--High-density data-storage. Hawkins said scientists have developed ways
to etch small words and pictures on certain substances, creating
microfiche-style images that are only atoms high. He suggested that
eventually, the entire Library of Congress and more could be put on a slab
the size of a credit card. Since the data wouldn't be in computer code, it
would be an ideal backup after major computer failure. 

Hawkins spoke of other developments, including voice-morphing technology
that allowed scientists to play an elaborate joke on Gen. Hugh Shelton,
the chairman of the Joint Chiefs of Staff. 

Los Alamos staff members, using special software, recorded about 10
minutes of the general's speaking, then fabricated the sound patterns into
a long, elaborate speech where Shelton's voice advocated the overthrow of
the U.S. government. Shelton personally asked for the tape after hearing
it. Hawkins assumes the general destroyed it. 

There is one other way the government can check in on the network of
hackers and potential terrorists on the Internet. Most of these rogues
communicate through pornographic sites, Hawkins said, because they know
government employees are forbidden to look at them at work. 

[What?! This is one of the most absurd statements I have seen. Most
rogues communicate via e-mail just like everyone else. The difference is,
they often rely on strong encryption to protect themselves. Strong 
encryption is another area the government "is forbidden to look at".]

He said now there are federal agents "who are authorized to go there." 

[Federal agents investigating computer crime were always allowed
to go there. How else would they bust illegal pornography?]