RE: [iwar] The Middle East


From: Michael Wilson
From: partners@7pillars.com
To: iwar@egroups.com

Sat, 28 Oct 2000 16:02:31 -0700 (PDT)


fc  Sat Oct 28 16:03:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Sat, 28 Oct 2000 16:03:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Sat Oct 28 23:03:14 2000)
X-From_: partners@7pillars.com  Sat Oct 28 18:03:07 2000
Received: from hj.egroups.com (hj.egroups.com [208.50.99.212]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id SAA32455 for ; Sat, 28 Oct 2000 18:03:02 -0500
X-eGroups-Return: sentto-279987-716-972774176-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hj.egroups.com with NNFMP; 28 Oct 2000 23:02:57 -0000
X-Sender: partners@7pillars.com
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_2_1); 28 Oct 2000 23:02:56 -0000
Received: (qmail 32353 invoked from network); 28 Oct 2000 23:02:56 -0000
Received: from unknown (10.1.10.27) by m2.onelist.org with QMQP; 28 Oct 2000 23:02:56 -0000
Received: from unknown (HELO sirius.infonex.com) (216.34.245.2) by mta2 with SMTP; 28 Oct 2000 23:02:51 -0000
Received: from localhost (partners@localhost) by sirius.infonex.com (8.8.8/8.8.8) with SMTP id QAA07553 for ; Sat, 28 Oct 2000 16:02:49 -0700 (PDT)
X-Authentication-Warning: sirius.infonex.com: partners owned process doing -bs
X-Sender: partners@sirius.infonex.com
To: iwar@egroups.com
In-Reply-To: 
Message-ID: 
From: Michael Wilson 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Sat, 28 Oct 2000 16:02:31 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: RE: [iwar] The Middle East
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Actually, take a look at: http://www.7pillars.com/papers/Waging.html
as well as
http://www.7pillars.com/papers/phvsh.html
http://www.7pillars.com/papers/phvshcrt.html

On Sat, 28 Oct 2000, Ozair wrote:

> It seems that you have presented only one side of the picture. It would be
> equitable to point out that unofficial and official sites in Israel are also
> using the same methods mentioned below to hack and attack the sites owned by
> Hezbollah. This cyber war (or as we call it DoS attacks) are being initiated
> by both sides.
> 
> Check out the full story at the link below.
> 
> http://www.dawn.com/2000/10/28/int2.htm
> 
> While commenting on the event itself purely from a technical point of view.
> I would say that this is a primitive form of warfare in cyberspace and is
> equivalent to choking a guy with bare hands. In time to come we may see a
> more advanced form of warfare which may actually be more destructive than
> the simple DoS.
> 
> 
> Regards,
> Ozair
> 
> 
> -----Original Message-----
> From: Fred Cohen [mailto:fc@all.net]
> Sent: ?????, ????? ????? 28, 2000 7:03 PM
> To: Information Warfare Mailing List
> Subject: [iwar] The Middle East
> 
> 
> Subject: E-mail Flooding and Denial of Service (DoS) Attacks
> 
> 
> ANSIR E-MAIL - National Infrastructure Protection Center (NIPC), Middle
> East E-mail Flooding and Denial of Service (DoS) Attacks (NIPC Advisory
> 00- 057).
> 
> This assessment is intended to advise recipients concerning an increased
> level of cyber activity against Web sites related to Israel and
> pro-Palestinian organizations.  Due to the credible threat of terrorist
> acts in the Middle East region, and the conduct of these web attacks,
> recipients should exercise increased vigilance to the possibility that
> U.S.  government and private sector Web sites may become potential
> targets.  The methods observed in the conduct of these attacks are
> transitory in nature, and do not pose a threat of lasting damage to Web
> sites.
> 
> The recent unrest in the Middle East appears to have been responsible
> for an increase in cyber attack activity between sympathizers on both
> sides of the tensions.  Known targets have included Web sites operated
> by the Israeli government and military as well as Web sites operated by
> pro- Palestinian organizations including Hizballah and Hamas.
> 
> Numerous Web sites have been found on the Internet that contain messages
> advocating cyber attack activity against both Israeli and pro-
> Palestinian Web sites, and in some instances include interfaces for
> launching automated e-mail flood, ping flood or other DoS attacks.
> 
> Methods of attack against Israeli Web sites include automated e-mail
> floods and high volumes of coordinated requests for Web services by
> pro-Palestinian sympathizers.  Media sources have reported that Web
> pages operated by Israel's Foreign Ministry, the Israel Defense Force,
> the Prime Minister's Office, and the Treasury have been targeted for DoS
> attacks, and some indications are that other unpublicized sites in the
> .il domain have experienced similar attacks since hostilities
> intensified.  Some of the documented e-mail flood attacks have
> reportedly involved users of U.S.  free Web-based e-mail providers
> Yahoo! and Hotmail.
> 
> While there are currently no indications that any specific U.S.  Web
> sites have been or will be targeted as a result of this activity, the
> NIPC recommends that recipients of this assessment remain vigilant to
> the possibility that there could be some spill-over activity and that
> U.S.  sites could become targeted.  In recent days, the overall threat
> condition for U.S.  military forces in the Middle East has increased due
> to new, credible threats of terrorist acts in the region.  Similarly,
> NIPC views the current conditions as creating the possibility for
> related cyber attack activity against U.S.  sites.
> 
> Information systems security professionals should be prepared to take
> recommended preventative measures including, but not limited to the
> following: Be prepared to take appropriate steps to limit ping flooding
> at border routers.  Be prepared to block source e-mail addresses in the
> event of e-mail flooding.  Ensure appropriate patches are installed to
> operating systems to limit vulnerability to other DoS attack methods.
> 
> Previous NIPC Advisories are available at the NIPC webpage: www.nipc.gov
> 
> Recipients are asked to report, actual or suspected, criminal activity
> to their local FBI office or to NIPC, and to your military or civilian
> computer response group and other law enforcement agencies as
> appropriate.
> 
> Incidents may be reported online at www.nipc.gov/incident/cirr.htm.
> 
> This FBI Awareness of National Security Issues and Response (ANSIR)
> communication is intended for corporate security professionals and
> others who have requested to receive unclassified national security
> advisories.  Individuals who wish to become direct recipients of FBI
> ANSIR communications should provide business card information, i.e.
> company name, address, phone, fax, etc., to ansir@leo.gov for
> processing, with a brief description of the product and/or service
> provided by your organization.
> 
> 
> 
> ------------------
> http://all.net/
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Talk to your friends online with Yahoo! Messenger.
> http://im.yahoo.com
> 
> 
> ------------------
> http://all.net/
> 


-------------------------- eGroups Sponsor -------------------------~-~>
eGroups eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9698/14/_/595019/_/972774176/
---------------------------------------------------------------------_->

------------------
http://all.net/