Internet in Peril -Military InfoWarfare Seminar

Chris Hind (
Tue, 17 Sep 1996 07:11:25 -0700

You've gotta see this. It meantions in this document that they've got
strategies to take down the net or paralyze it as well as they have info on
how to create EMF pulse pipe bombs. The original URL is on

[Conferences] Fifth International Information Warfare [InfoWarCon 96]

Electronic Civil Defense for the 21st Century

The Convergence of the Commercial and the Military Sectors:
Vulnerabilities, Capabilities and Solutions

Sept 4-6, 1996, Washington, DC


Sponsored by:
Winn Schwartau, Interpact, Inc.
Robert Steele, Open Source Solutions, Inc.
National Computer Security Association

Sponsoring Organizations:
Command Software
Digital Equipment Corp
Norman Data Defense
Axent Technologies, Inc.

To assist in your navigation, please use the hyperlinks below to move down
the page:
[Conference Overview] [Sept 4 Program] [Sept 5 Program] [Sept 6 Program]
[Hotel Info] [Conference Fees] [Registration Form]


Conference Overview

Back to the Top of the Page
This Fifth International Conference on Information Warfare is an
unclassified, open source forum, and will examine the myriad questions of
Electronic Civil Defense from the US, International and multi-cultural


Conference Program

September 4, 1996
Back to the Top of the Page

* 17:00 - 20:00 - Registration Begins
* 18:00 - 20:00 - Reception for attendees, speakers, sponsors and the
press. Live Music, liquid refreshments and light food fare. Meet Mr.
Schwartau, Mr. Steele, Dr. Kabay and many of our other world-class

September 5, 1996
Back to the Top of the Page

* 6:30 - 7:50 - Registration
* 7:50 - 8:00 - Welcoming Comments and Administration:
Dr. Peter Tippett, NCSA
Winn Schwartau, Interpact
* 8:00 - 8:30 - Keynote Presentation:
"National Security in the Information Age"
Senator William Cohen, (R-Maine)
* 8:30 - 9:00 - "A Commander in Chief's View of Rear-Area, Home-Front
Vulnerabilities and Support Options."
General John J. Sheehan, US Supreme Allied Commander, Atlantic
Commander-in-Chief, US Atlantic Command
* 9:00 - 9:30 - "Global Finance: Protection in the Age of Electronic
Steve Katz, Chief InfoSecurity Office, Citibank
* 9:30 - 10:00 - "We Can't Do It Without the Private Sector"
Lt. Gen. Ken Minihan, USAF, Director, NSA
* 10:00-10:30 - Break
* 10:30-11:45 - National Policy Reviews of Electronic Civil Defense
Moderated by Winn Schwartau
o Panel Members:
Dr. Anders Eriksson and Peter Wallstroem National Defense
Research Establishment, Dept. of Defense Analysis, Sweden
Dr. Leroy Pearce,Ministry of Defence Information, Canada,
Ms. Sally Katzen, Administrator for Information and Regulatory
Affairs, Office of Management and Budget, USA
* 11:45 - 13:15 - Sponsored Lunch - Norman Data Defense
* 12:30 - 13:00 - Luncheon Address
* 13:15 - 14:30 - Breakout Sessions: A1, A2, A3 and A4
o A1 - A Military Briefing: The Electronic Projection of Power in a
C4I World
Moderated by General Jim McCarthy, USAF (Ret)
Capt. Gregory Balckburn, Dir Infowarfare, OSD/C3I
Air Vice Marshall Brendon O'Loughlin, Australian Defence Attache
o A2 - Protecting the Global Financial and Communications
Infrastructures: Weaknesses at the Transport Layer
Ron Eward, Martech, Inc.
One scary session! Forget about HERF Guns and hackers. Mr. Eward
will tell us how to wreak disaster with a few well placed
pick-axes, from New York to Palermo to Taipei. An incredible
research effort with global on the generally forgotten physical
underpinnings of Cyberspace. Do not miss his tremendously
important findings. Messrs. Eward and Schwartau upcoming book on
this overlooked topic will shake the financial global community.
o A3 - Media Manipulation, Perception Management and PsyOps
Moderated by Dr. Mich Kabay, NCSA
Jim Roberts, SOLIC
Mark Bender, ABC News
Neil Munro, Washington Technology
How can a nation-state use the media to bend the will of an
adversary, or leverage its own position prior to, in or after a
conflict? Who is really using who?
o A4 - National Defense University/ Session
Moderator - Dr. Dan Kuehl, Professor, NDU
Top students from the School of Information Warfare and Strategy,
the Nation's top-level school for potential flag officers in the
Information Warfare arena, will discuss their findings and
* 14:30 - 15:00 - Break
* 15:00 - 16:15 - Breakout Sessions B1, B2, B3 and B4
o B1 - Emergency/Disaster Planning for the Effects of Information
Moderator: Mark Aldrich, Chief Infosec Engineer, GRC
International, Inc.
Michael Logan, Federal Planning Associate, American Red Cross
William W. Donovan, CISSP, FEMA
Ken Barksdale, Assoc. of Contingency Planners
Assume the worst happens, and an infowar assault takes down major
life sustaining portions of the infrastructure. What do we do
about it? How do we minimize the damage and protect the victims
and citizens? These esteemed experts will tell you what they
think and then invite your comments.
o B2 - Legal Liabilities and Responsibilities in Information
Danielle Calloux, Judge, Committee on Intelligence, Belgium
Col. Charles Dunlap, Judge Advocate, USAF
Kenneth Bass III, Cyber-Attorney, Wash DC
If a company is attacked, and it loses significant assets, what
are the recourses of the stake holders? How do we measure and
evaluate the losses and responsibility? On the military side,
what constitutes an Act of War and what steps are necessary to
formulate a response?
o B3 - The Forensics of Information Warfare for Law Enforcement
Moderated by Michael Anderson, New Technologies Investigation
Howard Schmidt, Director, AF Office of Special Investigations
Ken Rosenblat, Santa Clara County Prosecutor, Author
"High-Technology Crime: Investigating Cases Involving Computers"
How can you tell you are under attack? Once you determine you
are, how do you make a case which will stand up in court? How do
you collect evidence? How do you involve law enforcement without
compromising your efforts? Experts share years of experience with
o B4 - Naval Post Graduate School Session
Moderator: Dr. Fred Levien, NPS
Top field grade students from the Naval Post Graduate School in
Monterey, California will present InfoWar papers and concepts.
* 16:15 - 16:45 - Break
* 16:45 - 18:00 - The Hacker/Underground and Social Engineering
Moderated by: Nic Chantler, Australian Intelligence
Andy Mueller-Maguhn, CHAOS Computer Club, Germany
Chris Goggans, co-founder, Legion of Doom, USA
John Gilmore, Electronic Frontier Foundation
Millicent Watts, freelance hacker, NYC
If you've ever wanted to know how hackers think; what makes them tick
and how they became the first Information Warriors, here are the
people who can answer your questions. These sessions are among the
most popular at every InfoWarCon. Security is ultimately a 'people
problem,' and a video of actual social engineering will be shown to
show how easy it is to exploit..
* 18::00 - 20:30 - Sponsored Reception/"Live Hackers" Off-Line

September 6, 1996
Back to the Top of the Page

* 7:50 - 8:00 - Opening Remarks and Administration
* 8:00 - 8:30 - "Domestic Law Enforcement and Electronic Civil Defense"
Louis Freeh, Director, FBI
* 8:30 - 9:00 - "The Convergence of Military and Civil Defense"
Gen, Jim McCarthy, USAF (Ret)
* 9:00 - 9:30 - "What is National Security?"
Michael R. Nelson, PhD, Special Ass't for Information Technology,
Ministry of Science, Technology and Informatics, Croatia
* 9:30 - 10:00 "Building a Society from the 'Net Up"
Pedrag Pale, Chairman of the InfoTech Coordinating Committee, Ministry
of Science, Technology, and Informatics, Croatia
* 10:00-10:30 - Break
* 10:30-11:45 - "Understanding and Defending Against Information
Terrorism, Politics and Industrial Espionage"
Matt DeVost, Information Systems and Technology Group, SAIC
Charles Swett, Acting Deputy Director, Office of the Ass't Sec'y of
Defense for Special Operations and Low-Intensity Conflict
Kenneth M. Geide, Acting Section Chief, Computer Investigation and
Threat Assesment Centers, FBI
Dr. Dan Groure, Political and Military Affairs, CSIS
* 11:45 - 13:15 - Sponsored Lunch
* 12:30 - 13:00 - Luncheon Address
* 13:00 - 14: 15 - Breakout Sessions C1, C2, C3 and C4
o C1 - Corporate Civil Defense:
Moderated by Don Sortor, Director, Security Prgms, Motorola, Inc.
A team of cross-industry experts from the primary
infrastructures, will examine how industry and government can and
should interact in the event of an Electronic Pearl Harbor. What
is the role of the company and its management? What policies
should be put into place to prepare for the malicious Acts of
Man? How should the government work with the private sector to
mitigate damages? These experts will set you on the right track.
o C2 - Denial of Service in the Private Sector: The Nuclear Weapons
of the Information Age: Magnetic Weapons from the Military to
Electronic Pipe Bombs
Moderated by Winn Schwartau
Carlo Copp, Defense Analyst, Australia
Kelly Goen, Penetration and Security Engineer
Magnetic weapons; directed energy weapons; high power microwaves;
HERF Guns; electromagnetic pulse cannons; EMP and EMP simulators.
Learn about the latest in high energy weapons systems and how
they can be used to attack and destroy critical electronically
based infrastructures. Then find out what the terrorist can do
with home-brew electronic pipe bombs.
o C3 - The Net Under Attack
Dr. Dorothy Denning, Chair, Computer Science Dept., Georgetown
Jim Christie, Air Force, Office of Special Investigations
What makes an attack on the Internet and what do we do about it?
Ms. Denning is an internationally recognized expert who will
guide us and her panel of experts through the maze of
possibilities. Incredibly valuable for security professionals.
o C4 - USAF School of Advanced Airpower Studies
Richard Szafranski, Colonel, USAF, Chair, Air War College
National Military Strategy
Col. Szafranski and his top students will discuss their views,
opinions on Information Warfare. The Air War College has produced
some of the most revolutionary papers in IW, including the now
globally recognized papers on taking down telecommunications and
national power systems.
* 14:30 - 15:00 - Break
* 15:00 - 16:15 - Breakout Sessions D1, D2, D3 and D4
o D1 - Anonymous Global Banking: Pitfalls and Solutions
Moderated by Moderator: Bruce Schneier
Kelly Goen, Security Engineer
Eric Hughes, Cypherpunks
Phil Zimmermann (awaiting confirmation)
How does anonymous international banking work? Is it merely a
front for Criminal Central? Or is there a true value? How do
conventional banking institutions view it? What about
cryptographic solutions? Are your funds "naked on the Net today?
Come see for yourself!
o D2 - The Ethics of Information Warfare
Moderated by Winn Schwartau
Col. Phil Johnson, USAF
Dr. Dan Kuehl, NDU
The ethical conundrums of Information Warfare will be examined
from all perspectives. Or: you have been attacked
anonymously--you suspect one party, without proof--another attack
is coming. What now? Should we develop new intelligence
capabilities to permit precision detection and response in
o D3 - National Information Assurance: Cooperation is the Key to
Safeguarding Communications, Power and Transportation
Moderated by: Major Brad Bigelow, Office of the Manager, National
Communications System
Jeff Sheldon, General Counsel, Utilities Telecommunications
Steve Fabes, Director of Electronic Delivery Sservices,
Carl Ripa, VP, National Security/Emergency Preparedness, Bellcore
Experts from the major civilian infrastructures will discuss how
past cooperation between industry and government has echoed
economic realities.
o D4 - "The Russians Are Coming"
Moderator: Greg Treverton, Director of National Security Program,
Rand Corp.
Dr. Victor I. Solntsev, Assoc Prof., Moscow State Tech Univ.
Dr. Dmitry Chereshkin, Russian Academy of Sciences
Dr. Georgy Smolian, Russian Academy of Sciences and Scientific
* 16:15 - 16:30 - Break
* 16:30 - 17:00 -What is War?
Moderated by Dr. Mich Kabay, NCSA
General Jim McCarthy, USAF (Ret)
John Petersen, President, The Arlington Institute

Back to the Top of the Page


Crystal Gateway Marriott
1700 Jefferson Davis Highway
Arlington, VA 22202
Discount hotel reservation cut-off date: August 14, 1996
703-271-5212 (Fax)



Payment made AFTER August 9, 1996:
$645.00 NCSA Members/OSS '96 Attendees
$695.00 All others


After August 9th, any cancellation will incur a $100.00 processing fee. If
the reservation is not cancelled and no one attends, the full registration
price will be charged. Substitute attendees are welcome with written
notification prior to the conference.

Back to the Top of the Page


Name: _____________________________________________

Title: _____________________________________________

Org: _____________________________________________

Address: _____________________________________________

Address: _____________________________________________

City: _____________________________________________

State: _________________ Zip: _____________________

Country: __________________________

Email: __________________________

Phone: __________________________

Fax: __________________________

Payment made AFTER August 9, 1996:
(___) 645.00 NCSA Members/OSS '96 Attendees
(___) 695.00 All others

Make checks payable to NCSA, or
Charge to: ( ) VISA ( ) MasterCard ( ) AMEX
Number: ________________________________________
Name on Card: ______________________________________
Exp date: _________
Signature: ________________________________________

National Computer Security Association
10 South Courthouse Avenue
Carlisle, PA 17013
FAX 717-243-8642

[top] Top of Page

[More] More Conferences.

[Main] Main Menu


This page updated August, 1996 by =A9 Copyright, 1995,