[iwar] [fc:01/Oct/01.USA:.War.on.Terror.may.Affect.PCs.]

From: Fred Cohen (fc@all.net)
Date: 2001-10-02 05:59:24


Return-Path: <sentto-279987-2604-1002027501-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 02 Oct 2001 06:02:35 -0700 (PDT)
Received: (qmail 13001 invoked by uid 510); 2 Oct 2001 13:00:00 -0000
Received: from n25.groups.yahoo.com (216.115.96.75) by 204.181.12.215 with SMTP; 2 Oct 2001 13:00:00 -0000
X-eGroups-Return: sentto-279987-2604-1002027501-fc=all.net@returns.onelist.com
Received: from [10.1.1.223] by n25.groups.yahoo.com with NNFMP; 02 Oct 2001 12:59:50 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 2 Oct 2001 12:58:20 -0000
Received: (qmail 48153 invoked from network); 2 Oct 2001 12:58:20 -0000
Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 2 Oct 2001 12:58:20 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 2 Oct 2001 12:59:44 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id FAA03223 for iwar@onelist.com; Tue, 2 Oct 2001 05:59:24 -0700
Message-Id: <200110021259.FAA03223@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 2 Oct 2001 05:59:24 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:01/Oct/01.USA:.War.on.Terror.may.Affect.PCs.]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

01/Oct/01 USA: War on Terror may Affect PCs.
By Greg Wright.
Experts say the Web is a key battleground and expect fallout among home computers

The World Wide Web may be more important than bullets in the war against
terrorism - at least that's what some cyber experts are saying. 

Osama bin Laden, the prime suspect behind Sept.  11's deadly attacks on
the Pentagon and World Trade Center, likely used encrypted e-mail, chat
rooms, and even Internet audio and digital images to communicate with
his "cells" around the world, and U.S.  agencies need more manpower to
monitor such activities, experts said. 

"Cyberspace is going to be the great battleground in the war against
terrorism," said John Arquilla, a senior consultant at Rand Corp.  in
Santa Monica, Calif. 

But a cyber war against terrorism could cause fallout among home
computer users, too.  U.S.  law enforcement agencies may seek broader
authority to monitor e-mail, chat rooms and other electronic
communication, said Leland Ware, a professor of law and public policy at
the University of Delaware in Newark. 

"First of all, what the terrorists want to do is change democracy," said
Ware, who urged Americans to fight any legislation that threatens
privacy.  "You don't want to give in and let them win - they want to
take away our freedom and fundamental rights."

At least one of the hijackers in the U.S.  terrorist attacks, Mohamed
Atta, connected to the Internet and sent e-mail with a student account
from a German university.  Federal investigators also asked Internet
service providers America Online and Earthlink to provide information on
subscribers who may be connected with the attacks. 

FBI officials refused to comment about whether a Web-based probe has
yielded clues, although news reports said the agency is working with
private Internet security experts.  Some analysts said the FBI is bound
to find valuable evidence on the Internet. 

Terrorist organizations such as bin Laden's al Qaida group send
encrypted messages via e-mail, said Jack Mattera, director of computer
forensics at The Intelligence Group in Far Hills, N.J. 

They also hide messages in digital music and pictures posted on the Web,
a practice called steganography, Arquilla said. 

The FBI's controversial Carnivore system scans the Internet and e-mail
for keywords and letter combinations that can hint at terrorist
activities, but Carnivore can be fooled if terrorists use code words,
Arquilla said.  Federal investigators probably are going through the
e-mail now from the 19 suspected terrorists to pick out code words used
to plan the airplane hijackings and terrorist hits in the United States,
Arquilla said.  Breaking such a secret language would be crucial in
preventing future attacks, he said. 

Steganography is also difficult to track, Mattera said.  For instance,
investigators would have to examine the data content of a photo
transmitted by terrorists with an original photo file to determine
whether it contains a hidden message, he said. 

"You have to compare the sizes of the two files," he said.  "The
embedded text will be bigger - sometimes much bigger."

The U.S.  government currently monitors more than 5,000 Web sites
devoted to terrorist and criminal activities, said Neil Livingstone, a
terrorism expert at Global Options LLC in Washington, D.C.  Some of
these include sites run by radical Islamic student groups in Vienna,
Va., and Richardson, Texas, that support bin Laden, he added. 

Congress approved $40 billion in emergency funds to fight terrorism and
aid victims of the New York and Pentagon attacks.  President Bush could
use this money to beef up terrorism investigation on the Web. 

"We're behind the curve in processing this stuff on a real time basis,"
Livingstone said.  "We can collect a lot more information."Gannett News
ServiceSend. 

Copyright (c) The Detroit News 2001. 
 DETROIT NEWS 01/10/2001 P1


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST