[iwar] [fc:San.Diegans.fighting.new.war.from.their.computer.terminals]

From: Fred Cohen (fc@all.net)
Date: 2001-09-23 16:21:18


Return-Path: <sentto-279987-2276-1001287236-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sun, 23 Sep 2001 16:23:11 -0700 (PDT)
Received: (qmail 6601 invoked by uid 510); 23 Sep 2001 23:21:42 -0000
Received: from n2.groups.yahoo.com (216.115.96.52) by 204.181.12.215 with SMTP; 23 Sep 2001 23:21:42 -0000
X-eGroups-Return: sentto-279987-2276-1001287236-fc=all.net@returns.onelist.com
Received: from [10.1.1.224] by hi.egroups.com with NNFMP; 23 Sep 2001 23:21:20 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 23 Sep 2001 23:20:36 -0000
Received: (qmail 49185 invoked from network); 23 Sep 2001 23:20:36 -0000
Received: from unknown (10.1.10.27) by 10.1.1.224 with QMQP; 23 Sep 2001 23:20:36 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 23 Sep 2001 23:21:18 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id QAA16502 for iwar@onelist.com; Sun, 23 Sep 2001 16:21:18 -0700
Message-Id: <200109232321.QAA16502@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 23 Sep 2001 16:21:18 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:San.Diegans.fighting.new.war.from.their.computer.terminals]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

NEIL MORGAN 
San Diegans fighting new war from their computer terminals
September 23, 2001
 
Like so much else before 9.11.01, it plays back to us now like a
black-and-white movie.  Remember the cyberspace manhunt for the kid
computer hacker Kevin Mitnick, then on the FBI's Ten Most Wanted list?It
gripped the world in 1999, until Tsutomu Shimomura, the eccentric genius
at the San Diego Supercomputer Center, finally outsmarted the kid and
ended his knockdown raids on U.S.  corporations and universities.What's
changed since then in computer terrorism and counterterrorism?

Everything, but not as much as we might wish.The hero Shimomura left the
supercomputer campus to live at Lake Tahoe.  "One of the smartest people
on the planet," as colleague Sid Karin calls him, Shimomura is revered
as a master computer sleuth and takes on only cases that intrigue him. 
And Mitnick? Out of jail now, he conducts an early-morning computer show
on Los Angeles radio.Meanwhile, computer encryption has become the
workaday mask of terrorism.  Federal surveillance of the Internet has
become a covert industry. 

This nation's 13 federal intelligence agencies are being told to
streamline and cooperate in war.Two days after the attacks in New York
and Washington, the Combating Terrorism Act of 2001 was introduced as an
amendment to a federal appropriations bill and quietly passed the
Senate.  It may become part of the legislative package coming to
Congress from Attorney General John Ashcroft.  Section 832 is at its
crux: It would enhance the U.S.  government's powers to spy on suspects'
communications in cyberspace.In the short space of two years since Kevin
Mitnick was on the run across America like a fleeing train robber, this
is not entertainment anymore. 

This is a war for the life of the world's most powerful nation.  Yet
under restrictions against such undercover spy networks as those from
which John Le Carre wrote magic yarns, our 13 intelligence agencies now
may garner as much as 70 percent of their information from open source
intelligence Web sites (OSINT).You may sample these Web sites, recently
devoted largely to rescue and anti-terrorism efforts, by logging on to
<A HREF="http://www.intellnet.org/">http://www.intellnet.org>, or
&lt;A HREF="<a
href="http://www.emergency.com/">http://www.emergency.com/>" <a
href="http://www.Emergency.com">http://www.Emergency.com> &lt;/A. 

So can Kevin Mitnick and the rest of the world, including hackers who in
recent days have bedeviled the Chicago-based emergency.com with viruses
and so-called Trojan horses, even damaging one of their servers.  One
reasonably wonders: Are these Osama bin Laden's hackers?Both in secret
intelligence personnel and in institutional power like that of UCSD, the
Supercomputer Center and the FBI's Regional Computer Forensic Lab, San
Diego is in the midst of America's war against computer terrorism. 

Some online slip that renders bin Laden vulnerable would stand in
history like the code breaking that helped make the Allies victors in
World War II.  These are pivotal intelligence matters about which most
sensible Americans would prefer, for the moment, to know rather less
than more.  It is enough to know that there are formidable San Diegans
already long active at the top of this curve.At the Supercomputer
Center, Tom Perrine leads the security group.  He recently was honored
quietly in law enforcement and intelligence circles as San Diego's
private sector investigator of the year. 

A year earlier, the same award went to Abraham Singer, a programmer
analyst at the Supercomputer Center.  (Each year, one award goes to a
law enforcement officer and one to the private sector.)Erin Kenneally,
an administrative specialist at the center who is also a lawyer, is
especially revered among San Diego judges.  She specializes in computer
forensics.  Defense attorneys in computer criminal cases manage usually
to arrive in court well enough versed in computerspeak.  Judges call on
her to provide seminars to bring them up to speed. 

Also at the center, Mihir Bellare, an associate professor, focuses on
the mathematics of encryptography as a field of computer security. 
Another programmer analyst, and two colleagues -- Stefan Savage and
Geoff Voelker -- study denial-of-service attacks in which computer
servers are overwhelmed and disabled.  Their work and that of thousands
more may never entertain us like the Kevin Mitnick case.  But they will
help save America. 

Neil Morgan's column is not running on its normal day or in its normal
place because of space devoted to terrorism coverage.  The column will
temporarily appear in the Metro section on Wednesdays, Fridays and
Sundays.  Morgan can be reached by e-mail at &lt;A HREF="mailto:<a
href="mailto:neil.morgan@uniontrib.com?Subject=Re:%20(ai)%20San%20Diegans%20fighting%20new%20war%20from%20their%20computer%20terminals%2526In-Reply-To=%2526lt;54.1b5afc14.28dfadcb@aol.com">neil.morgan@uniontrib.c
om</a>"<a
href="mailto:neil.morgan@uniontrib.com?Subject=Re:%20(ai)%20San%20Diegans%20fighting%20new%20war%20from%20their%20computer%20terminals%2526In-Reply-To=%2526lt;54.1b5afc14.28dfadcb@aol.com">neil.morgan@uniontrib.com</a>&lt;/A. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/XrFcOC/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:48 PDT