Return-Path: <sentto-279987-4469-1013753015-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 14 Feb 2002 22:24:09 -0800 (PST) Received: (qmail 16412 invoked by uid 510); 15 Feb 2002 06:03:50 -0000 Received: from n25.groups.yahoo.com (216.115.96.75) by all.net with SMTP; 15 Feb 2002 06:03:50 -0000 X-eGroups-Return: sentto-279987-4469-1013753015-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.165] by n25.groups.yahoo.com with NNFMP; 15 Feb 2002 06:01:45 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_2); 15 Feb 2002 06:03:35 -0000 Received: (qmail 81352 invoked from network); 15 Feb 2002 06:03:35 -0000 Received: from unknown (216.115.97.167) by m11.grp.snv.yahoo.com with QMQP; 15 Feb 2002 06:03:35 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 15 Feb 2002 06:03:35 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1F6NZo09023 for iwar@onelist.com; Thu, 14 Feb 2002 22:23:35 -0800 Message-Id: <200202150623.g1F6NZo09023@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 14 Feb 2002 22:23:35 -0800 (PST) Subject: [iwar] [fc:Official:.Terrorists.used.Internet.to.get.info.on.potential.targets] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Official: Terrorists used Internet to get info on potential targets BY PATRICK THIBODEAU, Computerworld, 2/14/02 <a href="http://www.idg.net/go.cgi?id=640686">http://www.idg.net/go.cgi?id=640686> The Bush administration's top cyberdefense official said today there is evidence that the terrorist group al-Qaeda was using the Internet to gather intelligence about critical facilities in the U.S., and other terrorist groups and nations may be doing the same. But so far, said Richard Clarke, the head of the White House's Office of Cyberdefenses, al-Qaeda and other terrorist organizations have limited their use of the Internet for communication and propaganda purposes. "None of those traditional terrorist groups has yet to attack over the Internet," said Clarke, who appeared today before the U.S. Senate Judiciary Subcommittee on Administrative Oversight and the Courts, but "that may be about to change." There is now evidence found in caves in Afghanistan, said Clarke, that al-Qaeda "was using the Internet to do at least reconnaissance of American utilities and American facilities." Clarke said al-Qaeda was gathering useful information off public Web sites. "If you put all the unclassified information together, sometimes it adds up to something that ought to be classified," he said. Clarke said the U.S. doesn't know whether there have been successful penetrations of critical infrastructure networks. But, "if I were a betting person, I would bet that many of our key networks have already been penetrated," he said. Trap doors, a secret means to gain network access, and logic bombs, devices that can cause systems havoc when triggered, "may already be in many of our key infrastructures because it is easy to do," said Clarke. Committee Chairman Charles Schumer (D-N.Y.) warned that a "well-planned and well-executed cyberattack on America wouldn't just mean the temporary loss of e-mail and instant messaging. Terrorists could gain access to the digital controls for the nation's utilities, power grids, air traffic control systems and nuclear power plants." The threat isn't just from terrorists groups. Criminal organizations, teenage hackers and nations such as Iraq, Iran, China, North Korea and Russia have all developed information warfare units, said Clarke. However, Clarke added, U.S. software makers such as Microsoft Corp. are taking steps to improve the security of products. That effort is coming partly in response to Sept. 11, but also to some virulent viruses that have caused $12 billion in damages last year. That damage caused a lot of end users to ask vendors why companies were paying so much for products that aren't secure."I think the word has gotten through to the IT manufacturers," he said. Clarke said the U.S. doesn't know the capability of potential enemy countries or terrorists groups to conduct cyberwarfare. Unlike physical weapons, he noted, "There's nothing for our satellites to take pictures of." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust When building an e-commerce site, you want to start with a secure foundation. Learn how with VeriSign's FREE Guide. http://us.click.yahoo.com/kWSNbC/XdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST