[iwar] [fc:Anti-Terror.Hackers.Seek.Govt.Blessing]

From: Fred Cohen (fc@all.net)
Date: 2001-10-17 21:30:11


Return-Path: <sentto-279987-3076-1003379413-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 17 Oct 2001 21:32:10 -0700 (PDT)
Received: (qmail 26323 invoked by uid 510); 18 Oct 2001 04:29:29 -0000
Received: from n9.groups.yahoo.com (216.115.96.59) by 204.181.12.215 with SMTP; 18 Oct 2001 04:29:29 -0000
X-eGroups-Return: sentto-279987-3076-1003379413-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n9.groups.yahoo.com with NNFMP; 18 Oct 2001 04:30:13 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 18 Oct 2001 04:30:13 -0000
Received: (qmail 66156 invoked from network); 18 Oct 2001 04:30:12 -0000
Received: from unknown (10.1.10.142) by l9.egroups.com with QMQP; 18 Oct 2001 04:30:12 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 18 Oct 2001 04:30:11 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id VAA07052 for iwar@onelist.com; Wed, 17 Oct 2001 21:30:11 -0700
Message-Id: <200110180430.VAA07052@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 17 Oct 2001 21:30:11 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Anti-Terror.Hackers.Seek.Govt.Blessing]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Anti-Terror Hackers Seek Govt Blessing 
By Brian McWilliams, Newsbytes, 10/17/2001
<a href="http://www.newsbytes.com/news/01/171223.html">http://www.newsbytes.com/news/01/171223.html>

A vigilante hacking group is attempting to obtain government approval
for its anti-terrorism efforts, Yihat's leader announced Tuesday. 
During an online meeting of the group's members, founder Kim Schmitz
said Yihat is negotiating with one European and one Asian government to
"legalize" the group's hacking activities in those nations. 
"Yihat members living or moving to those countries can join us and work
on our mission under governmental supervision and fully legal," should
the group obtain such approval, said Schmitz. 
In the meantime, Yihat members operate at their own legal risk, Schmitz
noted during the meeting, which was conducted using Internet relay chat. 
Schmitz, who was not immediately available for comment, did not reveal
the governments with which Yihat is negotiating. 
A spokesperson for the FBI said the agency does not condone illegal
actives such as retaliatory hacking. 
According to its Web site, Yihat, which stands for Young Intelligent
Hackers Against Terrorism, was founded after the Sept. 11 attacks on
America with the mission of attacking the electronic networks of
financial institutions used by terrorists. 
So far, the group's efforts to disrupt terrorist monetary resources
appear to have missed the mark. 
Officials from the Internet service provider which hosts Arab National
Bank told Newsbytes today that Yihat's claims to have penetrated a
computer operated by the bank last week are false. 
According to officials at Al Faisaliah Internet Services and Technology,
the Internet protocol address of the system allegedly compromised by the
group is not registered to Arab National Bank of Riyadh, Saudi Arabia.
The IP address belongs to another corporate customer which has not
reported any security breaches, according to the ISP. 
On Oct. 11, a member of Yihat claimed he had successfully penetrated a
server owned by Arab National Bank. As proof, the hacker, who uses the
nickname Splices, provided three spreadsheet files which contained what
appeared to be financial data, which he claimed to have gleaned from a
server at the IP address 212.93.193.138. 
Splices did not immediately respond to requests for comment. 
In September, Yihat claimed to have obtained information on accounts
held by Osama bin Laden and Al Qaeda from Al Shamal Islamic Bank in
Sudan. 
Last week the bank posted a notice at its site saying that three
accounts connected to the terrorist leader have been closed since the
mid-1990s. 
Yihat recently unveiled plans to open a training center for hackers. The
group is requesting that organizations offer their networks as targets
for the group's members to practice their hacking skills. In exchange,
Yihat will provide the organizations with a free report on any security
vulnerabilities found, according to a message announcing the Yihat
training center. 
During the group's meeting, which was held using Internet relay chat,
Schmitz also said Yihat would have t-shirts and caps bearing its name
available soon. 
Yihat's site is at http://www.kill.net .

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST