Return-Path: <sentto-279987-3098-1003420200-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 18 Oct 2001 08:51:08 -0700 (PDT) Received: (qmail 19459 invoked by uid 510); 18 Oct 2001 15:49:44 -0000 Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 18 Oct 2001 15:49:44 -0000 X-eGroups-Return: sentto-279987-3098-1003420200-fc=all.net@returns.onelist.com Received: from [10.1.1.222] by n15.groups.yahoo.com with NNFMP; 18 Oct 2001 15:50:03 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 18 Oct 2001 15:50:00 -0000 Received: (qmail 85839 invoked from network); 18 Oct 2001 15:50:00 -0000 Received: from unknown (10.1.10.27) by 10.1.1.222 with QMQP; 18 Oct 2001 15:50:00 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 18 Oct 2001 15:49:59 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id IAA14643 for iwar@onelist.com; Thu, 18 Oct 2001 08:49:56 -0700 Message-Id: <200110181549.IAA14643@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 18 Oct 2001 08:49:55 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:FBI/NIPC.Warns.Of.Increased.Hacktivism,.Cyber.Protests] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cyber Protests: The Threat to the U.S. Information Infrastructure; FBI/NIPC Warns Of Increased Hacktivism, Cyber Protests By Brian Krebs, Newsbytes, 10/17/2001 Article at: http://www.newsbytes.com/news/01/171178.html Full text of report at: http://www.nipc.gov/cyberprotests.pdf The FBI's computer crime division today warned Americans to expect an increase in cyber protests and "hacktivism" in the wake of the U.S. response to the Sept. 11 terrorist attacks. In its latest alert, the National Infrastructure Protection Center said while most of the activity will come in the form of Web site defacements and denial-of-service attacks, systems supporting the nation's most critical infrastructures are the next most likely targets. "Although the cyber protests seen today have already caused limited damage, the potential for future attacks could bring about large economic losses as well as potentially severe damage to the national infrastructure, affecting global markets as well as public safety," the report warns. "The infrastructure has been targeted in other countries in cyber protests and it is expected that it will eventually be targeted in the United States as well," the NIPC said. "Cyber protesters certainly will target infrastructure more often and exploit opportunities to disrupt or damage it." The NIPC warning cites several incidents during the past two years in which cyber protesters have pooled their resources to attack and disable U.S. commercial and government Web sites. Following the collision of a Chinese fighter jet and a U.S. naval reconnaissance plane in April and early May of this year, pro-Chinese hacktivists defaced or crashed nearly 100 U.S. sites in a week-long campaign. Pro-Chinese hackers also were largely responsible for the Sadmind worm, which infected an estimated 11,000 U.S.-based computer systems. This time last year the world witnessed the first public hacker war between pro-Israeli and pro-Palestinian hackers. For the better part of a month, hacktivists took turns defacing and crashing government Web sites affiliated with each nation. President Bush recently appointed long-time electronic security aide Richard Clarke to serve as the administration's special advisor for cyberspace security. Last week, Clarke asked telecommunications companies to assist in efforts to build Govnet, a secure government computer network that would have "no risk of outside penetration." Yet, for all of the FBI's warnings of impending hacktivist activity in the wake of the Sept. 11 attacks - this is the second in three weeks - computer security experts say the expected response from pro-Afghanistan groups has not yet materialized. "Aside from some claims of attacks on Sudanese and Saudi banks, we haven't seen hardly anything," from either U.S. or pro-Afghan hackers, said Chris Rouland, director of "X-Force," the research and development team for Atlanta-based Internet Security Systems. "Frankly, I'm surprised, because we expected attacks coming from Pakistan, which has a very known and active hacker population." Rouland said one of the reasons for the lack of activity could be that Afghanistan lacks the type of well-developed computer infrastructure that would serve as a target or platform for launching attacks on sites in the United States. Rouland added that some U.S. hackers might have reconsidered launching computer attacks, given strict penalties for hacking encompassed in anti-terrorism legislation passed by the U.S. House and Senate last week. "With the terrorism bills being passed by Congress, computer hackers now face life imprisonment," he said. "So it may just be that American hackers are thinking twice about hacking." ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST