[iwar] [fc:'Hacktivism'-Spike-Expected-Following-US-Retaliations]

From: Fred Cohen (fc@all.net)
Date: 2001-09-13 19:02:53


Return-Path: <sentto-279987-1864-1000439103-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 13 Sep 2001 20:46:12 -0700 (PDT)
Received: (qmail 22400 invoked by uid 510); 14 Sep 2001 03:45:31 -0000
Received: from n22.groups.yahoo.com (216.115.96.72) by 204.181.12.215 with SMTP; 14 Sep 2001 03:45:31 -0000
X-eGroups-Return: sentto-279987-1864-1000439103-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by cj.egroups.com with NNFMP; 14 Sep 2001 03:45:05 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_1); 14 Sep 2001 03:45:02 -0000
Received: (qmail 285 invoked from network); 14 Sep 2001 02:12:04 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 14 Sep 2001 02:12:04 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 14 Sep 2001 02:12:04 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id TAA20283 for iwar@onelist.com; Thu, 13 Sep 2001 19:02:53 -0700
Message-Id: <200109140202.TAA20283@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 13 Sep 2001 19:02:53 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:'Hacktivism'-Spike-Expected-Following-US-Retaliations]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

'Hacktivism' Spike Expected Following US Retaliations 
By Brian Krebs, Newsbytes, 9/13/2001
<a href="http://www.newsbytes.com/news/01/170071.html">http://www.newsbytes.com/news/01/170071.html>

Security experts and federal cyber-crime officials are bracing for a
surge in nefarious Internet activity once the U.S. retaliates for
Tuesday's terrorist attacks in New York and Washington, D.C. 
Chris Rouland, director of "X-Force," the research and development team
for Atlanta-based Internet Security Systems Inc., said aside from a few
loosely organized denial-of-service attacks against sites in the Middle
East, ISS hasn't yet seen signs of a corresponding cyber-threat. 
Yet, that is likely to change in the coming days, Rouland said, as U.S.
authorities zero in on the source of the attacks and take retaliatory
action. 
"Right now the script kiddies don't have a well-defined target of what
to attack yet, and they won't until the U.S. decide who they're going to
go after," Rouland said. "I think once that happens, however, we will
see a significant increase." 
Almost exactly one year ago, the world witnessed the first public hacker
war between pro-Israeli and pro-Palestinian hackers. For the better part
of a month, "hacktivists" took turns defacing and crashing government
Web sites affiliated with each nation. 
Following the collision of Chinese fighter jet and an American spy plane
in May, hackers sympathetic to either side joined in a series of often
destructive attacks on U.S.- and Chinese-based Web sites. 
ISS is the lead contractor for the information technology sector's
Information Sharing and Analysis Center (ISAC), one of four such centers
formed to share information on vulnerabilities and cyber-attack data
within various industry sectors (the energy, banking and
telecommunications sectors maintain the other three ISACs). 
The National Infrastructure Protection Center (NIPC) - the cyber-crime
arm of the FBI's counter-terrorism division - has been working overtime
with computer security companies and the various ISACs to gather
information on suspicious Internet communications that could hold clues
about the source of Tuesday's attacks on the World Trade Center and the
Pentagon. 
According to FBI sources, NIPC has asked industry ISAC centers to
prepare integrity and security status reports on their physical and
virtual infrastructure. That report could be made available as early as
Friday or next Monday, sources say. 
Phillip Lacombe, president of information and infrastructure protection
for Veridian, an IT-ISAC member and government security contractor based
in Arlington, Va., said the FBI contacted his company early on,
requesting any data that might hold clues to identifying the attackers. 
But Lacombe also noted that Tuesday's disasters have reached well beyond
the cyber-information realm into nearly every sector of the nation's
critical infrastructures. The physical destruction of the twin towers in
New York, for instance, knocked out not only portions of the nation's
communications and economic foundations, but effectively stalled the
transportation sector as well. 
"There remains a substantial physical component to our critical
infrastructures that underpins it all," Lacombe said. "For instance,
there is still no express-mail delivery. You can't just walk into the
post office or Fedex and expect to have your package in California the
next day right now." 
Lacombe said the changes may force companies to begin considering
alternative forms of communication as a rule. 
"The question is what does that do in terms of pressure on other sectors
to include the use of e-mail or authenticated transmission of documents,
for example, that would be effective backups," Lacombe asked. "And we
are perhaps not as far down the line on that as we might be." 
ISS is on the Web at: http://www.iss.net

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get VeriSign's FREE GUIDE: "Securing Your Web Site for Business." Learn about using SSL for serious online security. Click Here!
http://us.click.yahoo.com/LgMkJD/I56CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:43 PDT