[iwar] [fc:Security.analysts.dismiss.fears.of.terrorist.attackers]

From: Fred Cohen (fc@all.net)
Date: 2002-07-04 07:30:17


Return-Path: <sentto-279987-4948-1025792996-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 07:31:10 -0700 (PDT)
Received: (qmail 28457 invoked by uid 510); 4 Jul 2002 14:29:34 -0000
Received: from n21.grp.scd.yahoo.com (66.218.66.77) by all.net with SMTP; 4 Jul 2002 14:29:34 -0000
X-eGroups-Return: sentto-279987-4948-1025792996-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.196] by n21.grp.scd.yahoo.com with NNFMP; 04 Jul 2002 14:29:56 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 4 Jul 2002 14:29:55 -0000
Received: (qmail 62602 invoked from network); 4 Jul 2002 14:29:55 -0000
Received: from unknown (66.218.66.218) by m3.grp.scd.yahoo.com with QMQP; 4 Jul 2002 14:29:55 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 4 Jul 2002 14:29:55 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g64EUHD30888 for iwar@onelist.com; Thu, 4 Jul 2002 07:30:17 -0700
Message-Id: <200207041430.g64EUHD30888@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Jul 2002 07:30:17 -0700 (PDT)
Subject: [iwar] [fc:Security.analysts.dismiss.fears.of.terrorist.attackers]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: ***

Security analysts dismiss fears of terrorist hackers  Electricity, water systems hard to damage online
<a href="http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/06/30/MN152350.DTL&type=tech">http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/06/30/MN152350.DTL&type=tech>

Bill Wallace, Chronicle Staff Writer     Sunday, June 30, 2002

Despite growing government concern that al Qaeda and its allies may try
to use computers to disrupt electrical power grids, transportation
systems and emergency communication networks, many experts on terrorism
and computer security are skeptical about the overall menace of
cyber-terrorism.

"The notion that somebody armed with a laptop in Peshawar, Pakistan,
could bring down California's power grid is pretty far-fetched," said
Kevin Terpstra,

communications director for the California Department of Information
Technology, an agency responsible for assessing the security of the
state's computer systems.

"There is reason to be concerned about computer security and critical
infrastructure vulnerabilities . . . but the likelihood of this type of
an attack is very small."

Cyber-terrorism has become one of the hottest buzzwords among national
security officials, especially since the Sept. 11 attacks. The subject
has been the topic of numerous legislative hearings in Washington, D.C.,
and more than 560 newspaper and magazine articles using the term have
been published in the past year alone.

In January, the FBI's National Infrastructure Protection Center warned
that information on the Internet about power plants, toxic waste dumps
and other sensitive sites could be used by foreign extremists to launch
attacks on the United States.

And last week, the Business Software Alliance, a trade association,
released an industry survey in which 59 percent of the information
technology specialists polled said they considered a major terrorist
computer attack likely in the next 12 months.

Underscoring the possible danger, several newspapers reported that
computer operators in the Middle East and South Asia had attempted to
penetrate computer systems in Northern California last fall.

However, experts interviewed by The Chronicle said the vast majority of
these computer intruders are trying to steal information -- not shut
down electrical utilities, release water from dams or engage in other
dangerous acts of sabotage.

It is difficult, the experts say, for a hacker to launch an attack on an
infrastructure control system because very few of these systems are
accessible through the Internet.

In March, CIO magazine, a journal for computer system professionals,
published a detailed article on information security that debunked the
cyber- terrorist threat.

The magazine quoted Marcus Kempe, the director of operations for the
Massachusetts Water Resource Authority, as saying a cyber-terrorist
intent on tampering with his utility would have to make three
complicated intrusions to gain access to the necessary control systems.

And he would have to break into a highly secure building in
Massachusetts in order to make them because the system is not connected
to the Internet. This would present a problem for the terrorist who
thinks he can sabotage the utility by using his laptop in Pakistan.

"Could a computer attack get us to a high-consequence event? Probably
not," Kempe told the magazine.

David Wagner, a computer science professor at UC Berkeley who
specializes in information security, said some utilities do have
operations that are controlled by means of the Internet, "but not all of
them and maybe not the most critical ones."

"There are some crucial vulnerabilities," Wagner said, "but if you want
to rank how serious those vulnerabilities are, they are less serious
than what you can do with explosives and much less serious than what you
could do with chemical or biological agents.

"I used to be concerned about cyber-terrorism, but I think in the past
year I have come to realize that it is not the most serious thing we
have to worry about."

Dorothy Denning, the director of the Georgetown University Institute for
Information Assurance, testified before the House Judicial Committee two
years ago that cyber-terrorism, while worthy of concern, was overrated
as a threat to the American public. Denning told The Chronicle that her
opinion has changed little since the Sept. 11 attacks.

"To get noticed, they would have to do something very dramatic, like
flood a dam or something," she told The Chronicle. "Those kinds of
actions are a lot more difficult to engineer with a computer than they
would be with a bomb -- and whether they would work or not would be a
lot less certain."

John Pike, a weapons systems analyst and director of Globalsecurity.org,
a defense policy organization in Washington, D.C., stressed that
terrorists use simple, direct methods for operations because they are
less likely to fail.

He said the Sept. 11 attacks were a perfect example. "You had 20 people
get on four planes to attack two targets," he said. "Only 19 made the
flights, and only three of the planes reached their targets. But the
plan succeeded anyway because it was simple."

He said cyber-attack scenarios are too complex to have much appeal for
terrorist groups. Furthermore, they are likely to fail.

"If you pitch a bad script in Hollywood, the worst that can happen is
you get thrown out of the office," he said with a chuckle. "If I were
some guy from al Qaeda pitching a (complicated and risky)
cyber-terrorism plot to Osama bin Laden, I would be a little nervous
about making it out of his office alive. "

Security analysts dismiss fears of terrorist hackers

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/Pp91HA/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT