WHEN PRESIDENT CLINTON flew to Birmingham, England, to meet with world leaders, an FBI official named Michael Vatis went with him. Vatis' daunting job is to help protect the nation's technological and financial lifeblood.
"You've never heard of us because we're only a month old," said Michael Woods, an FBI man with degrees from Oxford and Harvard Law School who is Vatis' counsel. "Our task," Woods added, "is to detect and deter attacks on our critical infrastructures."Here are the Big Seven on the FBI's hit list: electrical energy, gas and oil depots, water supply systems, banking and finance, government operations, telecommunications and transportation.
The new $30 million National Infrastructure Protection Center is a key element in the mounting battle against cybercrime. Such tasks require nations to work together, which is why Vatis went to Birmingham.
Is Clinton simply on a media tear in calling attention to distant and murky threats?
"Every day, U.S. cities and communities are impacted by international crime, whether in the form of drug-related violence, terrorist attacks or financial scams that target our elderly citizens," responds Eric Holder, the No. 2 official in the Justice Department.
Cybercops aren't above pulling off scams of their own - in order to catch crooks, of course. They've been known, for example, to pass out free phone cards in crime-ridden areas. But these cards, unlike normal ones, trigger taps and bring down drug deals.
Threats in cyberspace range from what the FBI calls "recreational hackers" to foreign spy outfits that employ "information warriors."
"At least half the incidents involve insiders motivated by such things as greed or revenge," said the FBI's Woods. While the Big Seven haven't been preyed upon by, say, Iraqi agents, cybercops think that's where the real threat resides.
Before joining the summiteers, Vatis said: "We have not really seen (computers attacked) by terrorist groups or hostile nation states, at least that we know about, where they've gotten into a system and sought to destroy it. But the potential is clearly there, because once you're inside a system, and you acquire root access, you can do anything you want."
The presidential commission that spawned Vatis's shop also urged Clinton to set up a White House office to work with key industries in shielding their computers from outsiders.
The true value of networks - including the some 40,000 networks that serve the Defense Department - is their ability to work together. But their very strength exposes their underlying weakness.
As Robert Marsh, the retired general who headed Clinton's commission on infrastructures, explained the effort to attuned to the growing interdependencies of the infrastructures. "The information technology networks have been linked together in such a fashion that you can contemplate cascading failures from one system into another. And a well-engineered effort to do serious harm would, in fact, try to exploit those interdependencies."