[iwar] [fc:How-Terrorists-Use-the-Internet]

From: Fred Cohen (fc@all.net)
Date: 2001-09-13 13:26:47


Return-Path: <sentto-279987-1851-1000413370-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 13 Sep 2001 13:38:11 -0700 (PDT)
Received: (qmail 10003 invoked by uid 510); 13 Sep 2001 20:36:34 -0000
Received: from n3.groups.yahoo.com (216.115.96.53) by 204.181.12.215 with SMTP; 13 Sep 2001 20:36:34 -0000
X-eGroups-Return: sentto-279987-1851-1000413370-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by hj.egroups.com with NNFMP; 13 Sep 2001 20:36:10 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_1); 13 Sep 2001 20:36:10 -0000
Received: (qmail 80089 invoked from network); 13 Sep 2001 20:36:08 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 13 Sep 2001 20:36:08 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 13 Sep 2001 20:36:05 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id NAA17849 for iwar@onelist.com; Thu, 13 Sep 2001 13:26:47 -0700
Message-Id: <200109132026.NAA17849@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 13 Sep 2001 13:26:47 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:How-Terrorists-Use-the-Internet]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

How Terrorists Use the Internet

By Jay Lyman, www.NewsFactor.com, 9/13/2001
<a href="http://dailynews.yahoo.com/h/nf/20010912/tc/7731_1.html">http://dailynews.yahoo.com/h/nf/20010912/tc/7731_1.html>

The same advantages the Internet and advanced technology bring to the
general public and to business -- speed, security and global linkage --
are helping international terrorist groups organize their deadly and
disruptive activities.

"The Internet and e-mail provide the perfect vehicles for these groups
to communicate with each other, to spread their message, to raise money
and to launch cyberattacks," iDefense director of intelligence for
special projects Ben Venzke told NewsFactor Network.

A recent report from U.S. officials indicates that terrorists' use of
the Web for communication and coordination through the use of encrypted
messages is widespread, with numerous sites -- many of which are unaware
of the use to which they are being put -- serving as conduits for
terrorist conspiracies.

Government and private Internet security firms are doing their best to
keep up with the terrorists, but the task is made more difficult by
advancing technologies available to groups bent on targeting the U.S.
and its citizens, allies and businesses.

Terror Tool

Security officials in government and private industry agree that the Web
is heavily used by terrorists such as Osama bin Laden (news - web sites)
and other extremist groups, including Middle East terror organizations
Hezbollah and Hamas.

"Terrorists use the Web mostly for propaganda and for information
exchange," said Matthew Devost, founding director of the Terrorism
Research Center. "If you move beyond the Web, terrorist organizations do
use information technology as a very viable and secure communication
mechanism."

Devost told NewsFactor that despite the Internet's viability as an
economic medium, it has proven somewhat insecure for commercial
transactions.

He said the Web could help facilitate attacks by terrorist groups on not
only the Internet economy, but on power, transportation and other
systems that rely on information that is linked to the Web.

'No Limit'

Terrorists are beginning to use the Web in interesting ways, Vigilinx
director of intelligence Jerry Freese told NewsFactor.

"There's really no limit to it," Freese said. "Anywhere you can send an
e-mail with an audio or graphics file is fair game."

Freese, whose security company provides secure servers, intruder
detection and security audits, said terrorist cells around the world use
the Internet for scheduling, meeting and organizing.

"We see the Web as a terrorism-assistance tool that allows them to do
things in secrecy," he said, referring to encrypted messages. "The thing
is, it can originate from anywhere. The Web, of course, is ubiquitous."

Freese said steganography -- putting encrypted messages in electronic
files -- is widely used by terrorist groups. A recent government report
indicated that terrorists have been hiding pictures and maps of targets
in sports chat rooms, on pornographic bulletin boards and on Web sites.

Reliance on the Net

Despite their ongoing efforts to cripple parts of the Web, disrupt
infrastructure systems such as electrical power or steal money and
information from government and businesses, terrorists have a vested
interest in keeping the Internet working.

"It's a very good tool for them," Freese told NewsFactor, "so they don't
want to disrupt the flow of the Web; rather, they'll target specific
companies that are working with or are sympathetic to their enemies."

Rogue Rights

While law enforcement officials are aware of terrorists' use of the
Internet, they cannot monitor Web sites for both logistical and legal
reasons, according to spokesperson Steve Berry of the U.S. Federal
Bureau of Investigations' National Infrastructure Protection Center.

"However repugnant to our perception and to the general public and law
enforcement their Web site or use of it might be, that does not give us
the authority to block them," Berry told NewsFactor. "That's free
speech. That's the country we live in."

Venzke, whose company tracks Web-based threats for Fortune 500 companies
and government, said law enforcement is also limited by national culture
and geography. The Web offers entry into any country from anywhere, and
with so many points linked together, terrorist activity is often
impossible to track.

"How do you force an [Internet service provider] halfway around the
world, which may not be friendly to you to begin with, to shut down a
Web site?" Venzke asked.

Predicting Protection

The rapid advancement of technology makes it hard to fight terrorists,
who, experts agree, are adept at using the Internet and other advanced
technology. Bin Laden's al Qaida and other terrorist groups have
reportedly used encryption programs available free on the Web, as well
more powerful anti-spy software purchased on the open market.

The Terrorism Research Center's Devost said that despite a number of
valid efforts to combat terrorists, targeted countries and businesses
are not prepared.

"Most nations, and most companies, are not being diligent with regard to
addressing information security concerns and fortifying their security
posture," said Devost.

Counter Strike

Security experts claim they are getting better at detecting and decoding
terrorist communiques, but more awareness and information sharing is
needed.

"Right now, it's very hard to detect where these messages are coming
from and what their intent is," said Freese. "Information exchange is a
key issue here. We have a lot of repositories of information, but it
isn't shared. The government is trying to collate information from
private and government sources to coordinate defenses."

Devost agrees, adding that despite increased efforts to keep tabs on
terrorists, vulnerabilities are on the rise.

"Governments are making great progress in understanding the way these
groups are utilizing technology," Devost said, "[but] while we are
making progress, it is not enough."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web
site for Business" and learn all about serious security. Get it Now!
http://us.click.yahoo.com/r0k.gC/oT7CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:42 PDT