Internet in Peril -Military InfoWarfare Seminar

From: Chris Hind (chind@juno.com)
Date: Tue Sep 17 1996 - 08:11:25 MDT


You've gotta see this. It meantions in this document that they've got
strategies to take down the net or paralyze it as well as they have info on
how to create EMF pulse pipe bombs. The original URL is on
http://www.ncsa.com/infowar1.html

--------------------------------------------------------------------------
[Conferences] Fifth International Information Warfare [InfoWarCon 96]
                                Conference

               Electronic Civil Defense for the 21st Century

        The Convergence of the Commercial and the Military Sectors:
                Vulnerabilities, Capabilities and Solutions

                       Sept 4-6, 1996, Washington, DC

---------------------------------------------------------------------------

Sponsored by:
Winn Schwartau, Interpact, Inc.
Robert Steele, Open Source Solutions, Inc.
National Computer Security Association

Sponsoring Organizations:
Command Software
Digital Equipment Corp
IBM
Norman Data Defense
Axent Technologies, Inc.
---------------------------------------------------------------------------

To assist in your navigation, please use the hyperlinks below to move down
the page:
[Conference Overview] [Sept 4 Program] [Sept 5 Program] [Sept 6 Program]
[Hotel Info] [Conference Fees] [Registration Form]

---------------------------------------------------------------------------

                            Conference Overview

Back to the Top of the Page
This Fifth International Conference on Information Warfare is an
unclassified, open source forum, and will examine the myriad questions of
Electronic Civil Defense from the US, International and multi-cultural
perspectives.

---------------------------------------------------------------------------

Conference Program

September 4, 1996
Back to the Top of the Page

   * 17:00 - 20:00 - Registration Begins
   * 18:00 - 20:00 - Reception for attendees, speakers, sponsors and the
     press. Live Music, liquid refreshments and light food fare. Meet Mr.
     Schwartau, Mr. Steele, Dr. Kabay and many of our other world-class
     speakers.

September 5, 1996
Back to the Top of the Page

   * 6:30 - 7:50 - Registration
   * 7:50 - 8:00 - Welcoming Comments and Administration:
     Dr. Peter Tippett, NCSA
     Winn Schwartau, Interpact
   * 8:00 - 8:30 - Keynote Presentation:
     "National Security in the Information Age"
     Senator William Cohen, (R-Maine)
   * 8:30 - 9:00 - "A Commander in Chief's View of Rear-Area, Home-Front
     Vulnerabilities and Support Options."
     General John J. Sheehan, US Supreme Allied Commander, Atlantic
     Commander-in-Chief, US Atlantic Command
   * 9:00 - 9:30 - "Global Finance: Protection in the Age of Electronic
     Conflict"
     Steve Katz, Chief InfoSecurity Office, Citibank
   * 9:30 - 10:00 - "We Can't Do It Without the Private Sector"
     Lt. Gen. Ken Minihan, USAF, Director, NSA
   * 10:00-10:30 - Break
   * 10:30-11:45 - National Policy Reviews of Electronic Civil Defense
     Moderated by Winn Schwartau
        o Panel Members:
          Dr. Anders Eriksson and Peter Wallstroem National Defense
          Research Establishment, Dept. of Defense Analysis, Sweden
          Dr. Leroy Pearce,Ministry of Defence Information, Canada,
          Ms. Sally Katzen, Administrator for Information and Regulatory
          Affairs, Office of Management and Budget, USA
   * 11:45 - 13:15 - Sponsored Lunch - Norman Data Defense
   * 12:30 - 13:00 - Luncheon Address
   * 13:15 - 14:30 - Breakout Sessions: A1, A2, A3 and A4
        o A1 - A Military Briefing: The Electronic Projection of Power in a
          C4I World
          Moderated by General Jim McCarthy, USAF (Ret)
          Capt. Gregory Balckburn, Dir Infowarfare, OSD/C3I
          Air Vice Marshall Brendon O'Loughlin, Australian Defence Attache
        o A2 - Protecting the Global Financial and Communications
          Infrastructures: Weaknesses at the Transport Layer
          Ron Eward, Martech, Inc.
          One scary session! Forget about HERF Guns and hackers. Mr. Eward
          will tell us how to wreak disaster with a few well placed
          pick-axes, from New York to Palermo to Taipei. An incredible
          research effort with global on the generally forgotten physical
          underpinnings of Cyberspace. Do not miss his tremendously
          important findings. Messrs. Eward and Schwartau upcoming book on
          this overlooked topic will shake the financial global community.
        o A3 - Media Manipulation, Perception Management and PsyOps
          Moderated by Dr. Mich Kabay, NCSA
          Jim Roberts, SOLIC
          Mark Bender, ABC News
          Neil Munro, Washington Technology
          How can a nation-state use the media to bend the will of an
          adversary, or leverage its own position prior to, in or after a
          conflict? Who is really using who?
        o A4 - National Defense University/ Session
          Moderator - Dr. Dan Kuehl, Professor, NDU
          Top students from the School of Information Warfare and Strategy,
          the Nation's top-level school for potential flag officers in the
          Information Warfare arena, will discuss their findings and
          concerns.
   * 14:30 - 15:00 - Break
   * 15:00 - 16:15 - Breakout Sessions B1, B2, B3 and B4
        o B1 - Emergency/Disaster Planning for the Effects of Information
          Warfare:
          Moderator: Mark Aldrich, Chief Infosec Engineer, GRC
          International, Inc.
          Michael Logan, Federal Planning Associate, American Red Cross
          William W. Donovan, CISSP, FEMA
          Ken Barksdale, Assoc. of Contingency Planners
          Assume the worst happens, and an infowar assault takes down major
          life sustaining portions of the infrastructure. What do we do
          about it? How do we minimize the damage and protect the victims
          and citizens? These esteemed experts will tell you what they
          think and then invite your comments.
        o B2 - Legal Liabilities and Responsibilities in Information
          Warfare
          Danielle Calloux, Judge, Committee on Intelligence, Belgium
          Col. Charles Dunlap, Judge Advocate, USAF
          Kenneth Bass III, Cyber-Attorney, Wash DC
          If a company is attacked, and it loses significant assets, what
          are the recourses of the stake holders? How do we measure and
          evaluate the losses and responsibility? On the military side,
          what constitutes an Act of War and what steps are necessary to
          formulate a response?
        o B3 - The Forensics of Information Warfare for Law Enforcement
          Moderated by Michael Anderson, New Technologies Investigation
          Division
          Howard Schmidt, Director, AF Office of Special Investigations
          Ken Rosenblat, Santa Clara County Prosecutor, Author
          "High-Technology Crime: Investigating Cases Involving Computers"
          How can you tell you are under attack? Once you determine you
          are, how do you make a case which will stand up in court? How do
          you collect evidence? How do you involve law enforcement without
          compromising your efforts? Experts share years of experience with
          you.
        o B4 - Naval Post Graduate School Session
          Moderator: Dr. Fred Levien, NPS
          Top field grade students from the Naval Post Graduate School in
          Monterey, California will present InfoWar papers and concepts.
   * 16:15 - 16:45 - Break
   * 16:45 - 18:00 - The Hacker/Underground and Social Engineering
     Moderated by: Nic Chantler, Australian Intelligence
     Andy Mueller-Maguhn, CHAOS Computer Club, Germany
     Chris Goggans, co-founder, Legion of Doom, USA
     John Gilmore, Electronic Frontier Foundation
     Millicent Watts, freelance hacker, NYC
     If you've ever wanted to know how hackers think; what makes them tick
     and how they became the first Information Warriors, here are the
     people who can answer your questions. These sessions are among the
     most popular at every InfoWarCon. Security is ultimately a 'people
     problem,' and a video of actual social engineering will be shown to
     show how easy it is to exploit..
   * 18::00 - 20:30 - Sponsored Reception/"Live Hackers" Off-Line

September 6, 1996
Back to the Top of the Page

   * 7:50 - 8:00 - Opening Remarks and Administration
   * 8:00 - 8:30 - "Domestic Law Enforcement and Electronic Civil Defense"
     Louis Freeh, Director, FBI
   * 8:30 - 9:00 - "The Convergence of Military and Civil Defense"
     Gen, Jim McCarthy, USAF (Ret)
   * 9:00 - 9:30 - "What is National Security?"
     Michael R. Nelson, PhD, Special Ass't for Information Technology,
     Ministry of Science, Technology and Informatics, Croatia
   * 9:30 - 10:00 "Building a Society from the 'Net Up"
     Pedrag Pale, Chairman of the InfoTech Coordinating Committee, Ministry
     of Science, Technology, and Informatics, Croatia
   * 10:00-10:30 - Break
   * 10:30-11:45 - "Understanding and Defending Against Information
     Terrorism, Politics and Industrial Espionage"
     Matt DeVost, Information Systems and Technology Group, SAIC
     Charles Swett, Acting Deputy Director, Office of the Ass't Sec'y of
     Defense for Special Operations and Low-Intensity Conflict
     Kenneth M. Geide, Acting Section Chief, Computer Investigation and
     Threat Assesment Centers, FBI
     Dr. Dan Groure, Political and Military Affairs, CSIS
   * 11:45 - 13:15 - Sponsored Lunch
   * 12:30 - 13:00 - Luncheon Address
   * 13:00 - 14: 15 - Breakout Sessions C1, C2, C3 and C4
        o C1 - Corporate Civil Defense:
          Moderated by Don Sortor, Director, Security Prgms, Motorola, Inc.
          A team of cross-industry experts from the primary
          infrastructures, will examine how industry and government can and
          should interact in the event of an Electronic Pearl Harbor. What
          is the role of the company and its management? What policies
          should be put into place to prepare for the malicious Acts of
          Man? How should the government work with the private sector to
          mitigate damages? These experts will set you on the right track.
        o C2 - Denial of Service in the Private Sector: The Nuclear Weapons
          of the Information Age: Magnetic Weapons from the Military to
          Electronic Pipe Bombs
          Moderated by Winn Schwartau
          Carlo Copp, Defense Analyst, Australia
          Kelly Goen, Penetration and Security Engineer
          Magnetic weapons; directed energy weapons; high power microwaves;
          HERF Guns; electromagnetic pulse cannons; EMP and EMP simulators.
          Learn about the latest in high energy weapons systems and how
          they can be used to attack and destroy critical electronically
          based infrastructures. Then find out what the terrorist can do
          with home-brew electronic pipe bombs.
        o C3 - The Net Under Attack
          Dr. Dorothy Denning, Chair, Computer Science Dept., Georgetown
          Univ.
          Jim Christie, Air Force, Office of Special Investigations
          What makes an attack on the Internet and what do we do about it?
          Ms. Denning is an internationally recognized expert who will
          guide us and her panel of experts through the maze of
          possibilities. Incredibly valuable for security professionals.
        o C4 - USAF School of Advanced Airpower Studies
          Richard Szafranski, Colonel, USAF, Chair, Air War College
          National Military Strategy
          Col. Szafranski and his top students will discuss their views,
          opinions on Information Warfare. The Air War College has produced
          some of the most revolutionary papers in IW, including the now
          globally recognized papers on taking down telecommunications and
          national power systems.
   * 14:30 - 15:00 - Break
   * 15:00 - 16:15 - Breakout Sessions D1, D2, D3 and D4
        o D1 - Anonymous Global Banking: Pitfalls and Solutions
          Moderated by Moderator: Bruce Schneier
          Kelly Goen, Security Engineer
          Eric Hughes, Cypherpunks
          Phil Zimmermann (awaiting confirmation)
          How does anonymous international banking work? Is it merely a
          front for Criminal Central? Or is there a true value? How do
          conventional banking institutions view it? What about
          cryptographic solutions? Are your funds "naked on the Net today?
          Come see for yourself!
        o D2 - The Ethics of Information Warfare
          Moderated by Winn Schwartau
          Col. Phil Johnson, USAF
          Dr. Dan Kuehl, NDU
          The ethical conundrums of Information Warfare will be examined
          from all perspectives. Or: you have been attacked
          anonymously--you suspect one party, without proof--another attack
          is coming. What now? Should we develop new intelligence
          capabilities to permit precision detection and response in
          cyberwar?
        o D3 - National Information Assurance: Cooperation is the Key to
          Safeguarding Communications, Power and Transportation
          Moderated by: Major Brad Bigelow, Office of the Manager, National
          Communications System
          Jeff Sheldon, General Counsel, Utilities Telecommunications
          Council
          Steve Fabes, Director of Electronic Delivery Sservices,
          BankAmerica
          Carl Ripa, VP, National Security/Emergency Preparedness, Bellcore
          Experts from the major civilian infrastructures will discuss how
          past cooperation between industry and government has echoed
          economic realities.
        o D4 - "The Russians Are Coming"
          Moderator: Greg Treverton, Director of National Security Program,
          Rand Corp.
          Dr. Victor I. Solntsev, Assoc Prof., Moscow State Tech Univ.
          Dr. Dmitry Chereshkin, Russian Academy of Sciences
          Dr. Georgy Smolian, Russian Academy of Sciences and Scientific
          Council
   * 16:15 - 16:30 - Break
   * 16:30 - 17:00 -What is War?
     Moderated by Dr. Mich Kabay, NCSA
     General Jim McCarthy, USAF (Ret)
     John Petersen, President, The Arlington Institute

---------------------------------------------------------------------------
Back to the Top of the Page

HOTEL INFORMATION:

Crystal Gateway Marriott
1700 Jefferson Davis Highway
Arlington, VA 22202
Discount hotel reservation cut-off date: August 14, 1996
703-920-3230
703-271-5212 (Fax)

---------------------------------------------------------------------------

CONFERENCE FEES

Payment made AFTER August 9, 1996:
$645.00 NCSA Members/OSS '96 Attendees
$695.00 All others

CANCELLATION POLICY

After August 9th, any cancellation will incur a $100.00 processing fee. If
the reservation is not cancelled and no one attends, the full registration
price will be charged. Substitute attendees are welcome with written
notification prior to the conference.

---------------------------------------------------------------------------
Back to the Top of the Page

INFOWARCON 96 REGISTRATION FORM

Name: _____________________________________________

Title: _____________________________________________

Org: _____________________________________________

Address: _____________________________________________

Address: _____________________________________________

City: _____________________________________________

State: _________________ Zip: _____________________

Country: __________________________

Email: __________________________

Phone: __________________________

Fax: __________________________

FEES:
Payment made AFTER August 9, 1996:
(___) 645.00 NCSA Members/OSS '96 Attendees
(___) 695.00 All others

Make checks payable to NCSA, or
Charge to: ( ) VISA ( ) MasterCard ( ) AMEX
Number: ________________________________________
Name on Card: ______________________________________
Exp date: _________
Signature: ________________________________________

MAIL OR FAX OR EMAIL REGISTRATION TO:
National Computer Security Association
10 South Courthouse Avenue
Carlisle, PA 17013
FAX 717-243-8642
EMAIL: conference@ncsa.com

---------------------------------------------------------------------------
---------------------------------------------------------------------------
[top] Top of Page

[More] More Conferences.

[Main] Main Menu

---------------------------------------------------------------------------

This page updated August, 1996 by spiderwoman@ncsa.com. © Copyright, 1995,
NCSA®.



This archive was generated by hypermail 2.1.5 : Fri Nov 01 2002 - 14:35:45 MST