[iwar] [fc:Official:.Terrorists.used.Internet.to.get.info.on.potential.targets]

From: Fred Cohen (fc@all.net)
Date: 2002-02-14 22:23:35


Return-Path: <sentto-279987-4469-1013753015-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 14 Feb 2002 22:24:09 -0800 (PST)
Received: (qmail 16412 invoked by uid 510); 15 Feb 2002 06:03:50 -0000
Received: from n25.groups.yahoo.com (216.115.96.75) by all.net with SMTP; 15 Feb 2002 06:03:50 -0000
X-eGroups-Return: sentto-279987-4469-1013753015-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.165] by n25.groups.yahoo.com with NNFMP; 15 Feb 2002 06:01:45 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_2); 15 Feb 2002 06:03:35 -0000
Received: (qmail 81352 invoked from network); 15 Feb 2002 06:03:35 -0000
Received: from unknown (216.115.97.167) by m11.grp.snv.yahoo.com with QMQP; 15 Feb 2002 06:03:35 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 15 Feb 2002 06:03:35 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1F6NZo09023 for iwar@onelist.com; Thu, 14 Feb 2002 22:23:35 -0800
Message-Id: <200202150623.g1F6NZo09023@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 14 Feb 2002 22:23:35 -0800 (PST)
Subject: [iwar] [fc:Official:.Terrorists.used.Internet.to.get.info.on.potential.targets]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Official: Terrorists used Internet to get info on potential targets

BY PATRICK THIBODEAU, Computerworld, 2/14/02
<a href="http://www.idg.net/go.cgi?id=640686">http://www.idg.net/go.cgi?id=640686>

The Bush administration's top cyberdefense official said today there is
evidence that the terrorist group al-Qaeda was using the Internet to
gather intelligence about critical facilities in the U.S., and other
terrorist groups and nations may be doing the same.

But so far, said Richard Clarke, the head of the White House's Office of
Cyberdefenses, al-Qaeda and other terrorist organizations have limited
their use of the Internet for communication and propaganda purposes.

"None of those traditional terrorist groups has yet to attack over the
Internet," said Clarke, who appeared today before the U.S. Senate
Judiciary Subcommittee on Administrative Oversight and the Courts, but
"that may be about to change."

There is now evidence found in caves in Afghanistan, said Clarke, that
al-Qaeda "was using the Internet to do at least reconnaissance of
American utilities and American facilities."

Clarke said al-Qaeda was gathering useful information off public Web
sites. "If you put all the unclassified information together, sometimes
it adds up to something that ought to be classified," he said.

Clarke said the U.S. doesn't know whether there have been successful
penetrations of critical infrastructure networks. But, "if I were a
betting person, I would bet that many of our key networks have already
been penetrated," he said.

Trap doors, a secret means to gain network access, and logic bombs,
devices that can cause systems havoc when triggered, "may already be in
many of our key infrastructures because it is easy to do," said Clarke.

Committee Chairman Charles Schumer (D-N.Y.) warned that a "well-planned
and well-executed cyberattack on America wouldn't just mean the
temporary loss of e-mail and instant messaging. Terrorists could gain
access to the digital controls for the nation's utilities, power grids,
air traffic control systems and nuclear power plants."

The threat isn't just from terrorists groups. Criminal organizations,
teenage hackers and nations such as Iraq, Iran, China, North Korea and
Russia have all developed information warfare units, said Clarke.

However, Clarke added, U.S. software makers such as Microsoft Corp. are
taking steps to improve the security of products. That effort is coming
partly in response to Sept. 11, but also to some virulent viruses that
have caused $12 billion in damages last year.

That damage caused a lot of end users to ask vendors why companies were
paying so much for products that aren't secure."I think the word has
gotten through to the IT manufacturers," he said.

Clarke said the U.S. doesn't know the capability of potential enemy
countries or terrorists groups to conduct cyberwarfare. Unlike physical
weapons, he noted, "There's nothing for our satellites to take pictures
of."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
When building an e-commerce site, you want to start with a
secure foundation. Learn how with VeriSign's FREE Guide.
http://us.click.yahoo.com/kWSNbC/XdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST