JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for MAPPING-CYBERSPACE Archives


MAPPING-CYBERSPACE Archives

MAPPING-CYBERSPACE Archives


MAPPING-CYBERSPACE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

MAPPING-CYBERSPACE Home

MAPPING-CYBERSPACE Home

MAPPING-CYBERSPACE  December 2001

MAPPING-CYBERSPACE December 2001

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: "Feds To Draw 'Map' of Internet" (fwd)

From:

martin dodge <[log in to unmask]>

Reply-To:

Discussing ways of mapping and visualising Internet infrastructure and Web space <[log in to unmask]>

Date:

Thu, 13 Dec 2001 15:42:29 +0000

Content-Type:

TEXT/PLAIN

Parts/Attachments:

Parts/Attachments

TEXT/PLAIN (128 lines)

Hi, I'd be pretty interested to see what they come up with!
cheers
martin

----

>
>
> Friday December 07 12:58 PM EST
>
> Feds To Draw 'Map' of Internet
> By Tim McDonald, www.NewsFactor.com
> http://dailynews.yahoo.com/h/nf/20011207/tc/15181_1.html
>
> The U.S. federal government will begin the work of drawing a "map" of the
> Internet next month, in an attempt to improve the country's ability to
> better respond to future cyber-attacks, according to Richard Clarke,
> President Bush's advisor on cyber-security.
>
> The National Infrastructure Simulation and Analysis Center will diagram the
> complex links between the country's critical Internet infrastructure, such
> as interdependent telecom and information technology networks, electric
> power grids, transportation systems, and gas and oil pipelines.
>
> "The center will create an acupuncture map of the country, so we will know
> where to harden our protection," Clarke said in statement.
>
> Better Information Exchange
>
> The plan calls for better exchange of information between the private and
> government sectors, though it is not yet clear how the information exchange
> will take place.
>
> The goal is for the security industry overall to better understand the links
> between networks -- how one incident in one network may affect others -- so
> it can devise better security systems and put in place more effective
> responses.
>
> For example, a train derailment in Baltimore recently caused a fire in a
> tunnel, which, in turn, affected Internet connections in Chicago.
> Investigators learned later that the fire had damaged high-speed Internet
> backbone connections that were in the tunnel.
>
> Maps Available Now
>
> The effort would certainly not be the first attempt to diagram the Internet.
> There have been many, including the Internet Mapping Project, a long-term
> effort that collects routing data.
>
> The project describes its Internet map as a "tree-like structure with
> 100,000 nodes." Included on its site is a map of Serbia showing damage from
> the war. Researchers say they hope one day to make a movie that shows the
> growth of the Internet, based on the data they have collected.
>
> John Quarterman is perhaps the best-known cartographer and demographer of
> the Internet. His published maps can be found at Matrix Maps Quarterly.
>
> Billions to be Spent
>
> The action by the federal government is one of a flurry of moves involving
> the nation's Internet infrastructure since the September 11th terrorist
> attacks.
>
> Congress is currently considering legislation that would release roughly
> US$900 million to be used for research into cyber security. The money would
> be divided between the National Science Foundation and the National
> Institute of Standards and Technology.
>
> Another bill would increase overall IT security spending at six federal
> agencies by about 50 percent -- roughly $7 billion over five years.
>
> In addition, Congress is considering legislation that would ease
> restrictions included in the Freedom of Information Act. The new provisions
> would allow private companies to share information involving security
> breaches with the government without worrying about whether the information
> would be made public.
>
> That move has been opposed by some consumer groups, who claim the companies
> want to protect themselves from liability stemming from flawed software and
> hardware products.
>
> Attacks More Ambitious
>
> Federal law enforcement authorities have become increasingly concerned with
> the ability of malicious hackers, including hostile governments and
> terrorist organizations, to halt or disrupt critical government computer
> systems.
>
> In south Florida, for example, a hacker was able to break into local
> government systems and divert 911 calls to a local pizza parlor. In Houston,
> Texas, FBI officials nabbed a hacker before he could insert a worm into
> computers that would have resulted in the widespread shutdown of 911.
>
> And in 1997, a juvenile hacker shut down communications at an FAA tower in
> Worcester, Massachusetts, for six hours.
>
> Evolving Attacks
>
> There are increasing signs that large, organized cyber attacks will become
> part of future large-scale conflicts between nations and terrorists.
>
> For example, NATO servers were shut down for several days during the 2000
> bombing campaign in Serbia and Kosovo.
>
> "Recent attacks have targeted vital communications and critical
> infrastructure systems," said Michael Vatis, former head of the National
> Infrastructure Protection Center. "In the weeks and months to come, cyber
> attacks will evolve further."
>
>
>
>

_________________________________________________________________________

martin dodge

cyber geography research
centre for advanced spatial analysis, university college london
gower street, london, wc1e 6bt, united kingdom

email: [log in to unmask]        tel: +44 (0)207 679 1782

http://www.casa.ucl.ac.uk       http://www.cybergeography.org

                http://www.atlasofcyberspace.com
__________________________________________________________________________

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

January 2024
August 2023
May 2023
April 2018
January 2018
March 2017
December 2016
September 2013
June 2011
November 2008
October 2008
September 2008
August 2008
April 2008
March 2008
February 2008
October 2007
August 2007
July 2007
June 2007
December 2006
October 2006
September 2006
August 2006
June 2006
April 2006
March 2006
January 2006
December 2005
November 2005
September 2005
July 2005
June 2005
May 2005
March 2005
February 2005
January 2005
December 2004
November 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
February 2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager