Return-Path: <sentto-279987-2604-1002027501-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 02 Oct 2001 06:02:35 -0700 (PDT) Received: (qmail 13001 invoked by uid 510); 2 Oct 2001 13:00:00 -0000 Received: from n25.groups.yahoo.com (216.115.96.75) by 204.181.12.215 with SMTP; 2 Oct 2001 13:00:00 -0000 X-eGroups-Return: sentto-279987-2604-1002027501-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n25.groups.yahoo.com with NNFMP; 02 Oct 2001 12:59:50 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 2 Oct 2001 12:58:20 -0000 Received: (qmail 48153 invoked from network); 2 Oct 2001 12:58:20 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 2 Oct 2001 12:58:20 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 2 Oct 2001 12:59:44 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA03223 for iwar@onelist.com; Tue, 2 Oct 2001 05:59:24 -0700 Message-Id: <200110021259.FAA03223@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 2 Oct 2001 05:59:24 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:01/Oct/01.USA:.War.on.Terror.may.Affect.PCs.] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit 01/Oct/01 USA: War on Terror may Affect PCs. By Greg Wright. Experts say the Web is a key battleground and expect fallout among home computers The World Wide Web may be more important than bullets in the war against terrorism - at least that's what some cyber experts are saying. Osama bin Laden, the prime suspect behind Sept. 11's deadly attacks on the Pentagon and World Trade Center, likely used encrypted e-mail, chat rooms, and even Internet audio and digital images to communicate with his "cells" around the world, and U.S. agencies need more manpower to monitor such activities, experts said. "Cyberspace is going to be the great battleground in the war against terrorism," said John Arquilla, a senior consultant at Rand Corp. in Santa Monica, Calif. But a cyber war against terrorism could cause fallout among home computer users, too. U.S. law enforcement agencies may seek broader authority to monitor e-mail, chat rooms and other electronic communication, said Leland Ware, a professor of law and public policy at the University of Delaware in Newark. "First of all, what the terrorists want to do is change democracy," said Ware, who urged Americans to fight any legislation that threatens privacy. "You don't want to give in and let them win - they want to take away our freedom and fundamental rights." At least one of the hijackers in the U.S. terrorist attacks, Mohamed Atta, connected to the Internet and sent e-mail with a student account from a German university. Federal investigators also asked Internet service providers America Online and Earthlink to provide information on subscribers who may be connected with the attacks. FBI officials refused to comment about whether a Web-based probe has yielded clues, although news reports said the agency is working with private Internet security experts. Some analysts said the FBI is bound to find valuable evidence on the Internet. Terrorist organizations such as bin Laden's al Qaida group send encrypted messages via e-mail, said Jack Mattera, director of computer forensics at The Intelligence Group in Far Hills, N.J. They also hide messages in digital music and pictures posted on the Web, a practice called steganography, Arquilla said. The FBI's controversial Carnivore system scans the Internet and e-mail for keywords and letter combinations that can hint at terrorist activities, but Carnivore can be fooled if terrorists use code words, Arquilla said. Federal investigators probably are going through the e-mail now from the 19 suspected terrorists to pick out code words used to plan the airplane hijackings and terrorist hits in the United States, Arquilla said. Breaking such a secret language would be crucial in preventing future attacks, he said. Steganography is also difficult to track, Mattera said. For instance, investigators would have to examine the data content of a photo transmitted by terrorists with an original photo file to determine whether it contains a hidden message, he said. "You have to compare the sizes of the two files," he said. "The embedded text will be bigger - sometimes much bigger." The U.S. government currently monitors more than 5,000 Web sites devoted to terrorist and criminal activities, said Neil Livingstone, a terrorism expert at Global Options LLC in Washington, D.C. Some of these include sites run by radical Islamic student groups in Vienna, Va., and Richardson, Texas, that support bin Laden, he added. Congress approved $40 billion in emergency funds to fight terrorism and aid victims of the New York and Pentagon attacks. President Bush could use this money to beef up terrorism investigation on the Web. "We're behind the curve in processing this stuff on a real time basis," Livingstone said. "We can collect a lot more information."Gannett News ServiceSend. Copyright (c) The Detroit News 2001. DETROIT NEWS 01/10/2001 P1 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST