[iwar] [fc:Internet.Watchdog.Warns.of.Increased.Cyber-Protests.and.Hacking]

From: Fred Cohen (fc@all.net)
Date: 2001-10-30 06:17:38


Return-Path: <sentto-279987-3643-1004451456-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 06:19:07 -0800 (PST)
Received: (qmail 668 invoked by uid 510); 30 Oct 2001 14:16:52 -0000
Received: from n30.groups.yahoo.com (216.115.96.80) by 204.181.12.215 with SMTP; 30 Oct 2001 14:16:52 -0000
X-eGroups-Return: sentto-279987-3643-1004451456-fc=all.net@returns.onelist.com
Received: from [10.1.1.224] by n30.groups.yahoo.com with NNFMP; 30 Oct 2001 14:17:36 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 30 Oct 2001 14:17:35 -0000
Received: (qmail 60925 invoked from network); 30 Oct 2001 14:17:35 -0000
Received: from unknown (10.1.10.26) by 10.1.1.224 with QMQP; 30 Oct 2001 14:17:35 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 30 Oct 2001 14:17:34 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9UEHc017178 for iwar@onelist.com; Tue, 30 Oct 2001 06:17:38 -0800
Message-Id: <200110301417.f9UEHc017178@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 30 Oct 2001 06:17:38 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Internet.Watchdog.Warns.of.Increased.Cyber-Protests.and.Hacking]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Internet Watchdog Warns of Increased Cyber-Protests and Hacking 
Washington File, US State Department, 10/30/2001
<a href="http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01102901.glt&t=/products/washfile/newsitem.shtml">http://usinfo.state.gov/cgi-bin/washfile/display.pl?p=/products/washfile/latest&f=01102901.glt&t=/products/washfil
e/newsitem.shtml</a>

(Global communications network attractive forum for protests) (2870)

Cyber protests and Internet sabotage are likely to increase as political
dissenters become more attuned to the potential of the Internet,
according to the National Infrastructure Protection Center (NIPC), a key
U.S. government agency monitoring potential threats to communications,
energy, finance, and water systems. The prediction is included in a
report released in October 2001 entitled "Cyber Protests: The Threat to
the U.S. Information Infrastructure."

"Any (World Wide Web) site with an exploitable vulnerability will be
susceptible to a cyber attack," says the report, as political dissenters
and social protesters around the world become more technologically
sophisticated. "The potential for future attacks could bring about large
economic losses as well as potentially severe damage to the national
infrastructure, affecting global markets as well as public safety," the
report continued.

Losses and damages caused by cyber attacks have been limited, according
to the report, but electronic sabotage has become a frequently used tool
of dissenters. Some of the significant episodes cited in the report:

-- Computer-savvy Chinese hacked U.S. government sites after China's
embassy in Belgrade was accidentally hit during the NATO air campaign
against Yugoslavia.

-- Israeli and Palestinian hackers launched mutual cyber attacks in
October 2000 when peace talks broke down.

-- Pakistanis hacked Indian sites in connection with the ongoing dispute
over Kashmir.

-- Koreans sabotaged Japanese sites earlier this year to protest a
Japanese history textbook's treatment of atrocities committed by the
Japanese army in World War II.

Following is the text of the NIPC report:

(begin text)

National Infrastructure Protection Center Cyber Protests: The Threat to
the U.S. Information Infrastructure October 2001

Executive Summary

Political events and emerging international situations will increasingly
lead to cyber protests. The cyber protests that have occurred thus far
have had little impact on U.S. infrastructure. As computing technology
becomes faster and better, and hacking tools become more advanced and
easier to use, cyber protesting and hacktivism will become more
significant to U.S. national interests. Cyber protesters are becoming
increasingly more organized and their techniques more sophisticated but,
most likely, will continue to deface web sites and perform DoS attacks.
There will also be an increase in the number of apparently unrelated
hacking groups participating in the cyber protests. National boundaries
will not always be clearly delineated in attacks on opposing
organizations. International activity will also tend to spill over into
the United States. Because the United States is a multicultural,
world-leading nation it will suffer from attacks on culturally related
sites and structures in the future.

Generally, the most popularly targeted sites are those belonging to
government, educational, commercial, and cultural institutions. However,
any site with an exploitable vulnerability will be susceptible to a
cyber attack. The infrastructure has been targeted in other countries in
cyber protests and it is expected that it will eventually be targeted in
the United States as well. Cyber protesters certainly will target
infrastructure more often and exploit opportunities to disrupt or damage
it.

Web sites that remain open to known hacking tools will have a higher
probability of suffering defacement. Network administrators must remain
educated and defenses must evolve along with the threats and offensive
capabilities. Although the cyber protests seen today have already caused
limited damage, the potential for future attacks could bring about large
economic losses as well as potentially severe damage to the national
infrastructure, affecting global markets as well as public safety.

Introduction

In the last decade, with the explosion of the size of the Internet,
protests and political activism have entered a new realm. (1) Political
activism on the Internet has already generated a wide range of activity,
from using e-mail and web sites to organize, to web page defacements and
denial-of-service (DoS) attacks. (2) These politically motivated
computer-based attacks are usually described as hacktivism, a marriage
of hacking and political activism.

In addition to the consistent activity of groups devoted to a specific
long-term cause, the Internet has also seen short-term periods of
intense political activity, which can be referred to as cyber protests.
Cyber protests have become a worldwide phenomenon available to anyone
with access to computers. Unrestrained by geographic boundaries,
protesters have an enormous forum in which to be heard.

Cyber protesters have a wide range of goals or objectives. Some hackers
want to expose government corruption or fundamental violation of human
rights; others just want to hack and cause mischief for fun. It has only
been since 1998 that cyber protests have skyrocketed in popularity and
become commonplace in today's computerized world.

The most common type of cyber protest comes in the form of web page
defacements. In such scenarios, a web site is compromised through some
security deficiency and the hacker is able to alter it, many times
placing propaganda, profanity, or pornographic images on it. This can
range from being a nuisance and embarrassment for an organization to a
major economic loss for an e-commerce business.

Protests and civil disturbances are nothing new. People unhappy with
their situations have always found outlets to spread their message, be
it a peaceful sit-in, letter-writing campaign, picket march, or violent
gang fight. Now, with the advent of the Internet and the growing number
of people online, it has become easier to organize protests. That is not
to say that every web defacement is an organized event on the part of
some political organization. Many defacements are perpetrated by lone
hackers that have no political motivation other than to create chaos.
Nation-states and their respective citizens have also been involved in
cyber protests. Several countries have waged ongoing cyber battles
against each other through web defacements and DoS attacks. Mail bombing
is a popular form of a DoS attack. Massive amounts of e-mail or web
traffic are directed against a specific site, overloading it and causing
it to crash. It should be noted, however, that some parties involved in
these cyber protests are not citizens of the respective countries. They
might hold similar views or they might be involved just to participate
in hacking different sites. Alliances can be tenuous at best for some of
these groups.

Chinese Hackers

One high profile incident occurred in May 1999 after the United States
accidentally bombed the Chinese embassy in Belgrade, Yugoslavia during
the NATO air campaign. U.S. web sites were defaced in the name of China
and massive e-mail campaigns were executed to gain sympathy and support
for the Chinese cause. Government web sites were primarily targeted. The
U.S. Departments of Energy and the Interior, and the National Park
Service all suffered web page defacements. In addition, the White House
web site was taken down for three days after it was continually mail
bombed. This action was relatively unorganized in fashion, short in
length, and affected a small number of U.S. sites.

Pro-Chinese hackers also acted against Taiwan during the Taiwanese
presidential elections in August and September 1999. Cyber protesters
and hacktivists compromised 165 Taiwanese web sites, mainly defacing
them, over the two-month period. Their ultimate goal, as it was stated,
was to negatively affect and bring down Taiwan's infrastructure. Among
the targeted sites were electricity, economic institutions,
telecommunications, and air traffic control. Although teams began to
develop and organize near the end of the operations, the damage was
relatively light, similar to the attacks on U.S. sites earlier in the
year. Importantly, strategic targeting and some organization of forces
became accepted strategies for future protests and hacks. These hackers
are likely to become more organized and more successful in future
incidents. (3)

In late April and early May 2001 pro-Chinese hacktivists and cyber
protesters began a cyber assault on U.S. web sites. This resulted from
an incident in early April where a Chinese fighter jet was lost at sea
after colliding with a U.S. naval reconnaissance airplane. It also
coincided with the two-year anniversary of the Chinese embassy bombing
by the United States in Belgrade and the traditionally celebrated May
Day and Youth Day in China. Led by the Honkers Union of China (HUC),
pro-Chinese hackers defaced or crashed over 100 seemingly random web
sites, mainly .gov and .com, through DoS attacks and similar exploits.
(4) Although some of the tools used were sophisticated, they were
readily available to both sides on the Internet.

Many defacements of U.S. sites included posting pictures of the dead
Chinese pilot Wang Wei and profane messages calling for the downfall of
the United States. ProUnited States hackers responded with similar
defacements, messages, and damage on 300 Chinese web sites. Of interest
is that some pro-Chinese hackers violated hacker etiquette by wiping
some compromised servers. (5) The rule of thumb is to deface or crash a
web site but to leave the information intact, otherwise it is considered
bad form. (6)

Israeli and Palestinian Hackers

In October 2000, Israeli and Palestinian hackers engaged in adversarial
hacking when the prolonged peace talks between the two groups broke
down. During this difficult time, hackers seized the opportunity to
attack web sites belonging to the opposition. Starting October 6, 2000,
40 Israeli web sites and at least 15 Palestinian web sites suffered
defacements at the hands of opposing hackers. (7) This coincided, of
course, with physical violence in the region. It was also a problem for
U.S. based web sites. U.S. web sites will often fall victim, regardless
of their lack of proximity or involvement in the events. For example,
several U.S. sites were hacked by pro-Palestinian hacktivists, including
the take down of a lobbyist group web site. The hackers then posted
group membership information and credit card numbers. (8) This activity
did little to affect the United States as a whole although it
illustrates how a seemingly unrelated event can potentially affect U.S.
sites.

The level of sophistication ranged from low-level activity using simple
defacements to coordinated, relatively sophisticated attacks such as
potential root access penetrations. Several hacking tools were developed
specifically for this engagement. Any type of attack was considered
during this time, including the perpetration of viruses, DoS attacks
with e-mail bombing, and sustained, amplified pinging attacks. Web sites
containing these various hacking tools were readily available for
download to anyone who wanted to join the action.

Pro-Palestinian hackers hit any type of Israeli sites that they were
able to compromise, many times defacing them with messages such as,
"Free Palestine" or "Free Kashmir." (9) FloodNet software was a major
tool used by the Israelis. The cyber protesters simply visited a site
and FloodNet would repeatedly send requests to the targeted server. This
type of virtual sit-in is a popular form of a DoS attack. Many of these
attacks were successful as servers were bombarded and went down
repeatedly. Targets included ethnic specific organizational web sites
and those of financial institutions to disrupt the infrastructure.
E-commerce sites crashed and there was an economic impact reflected in
the Israeli markets. It was, however, the root access attempts that were
most dangerous for the defenders. Hackers who can gain root access to
sites give them unlimited freedom to do whatever they wish. This is the
highest level of penetration possible although no successful root access
penetrations were reported.

These events attracted a wide variety of hackers eager to join the
fight. Both sides were well-organized and used reconnaissance and
intelligence gathering techniques to maximize their effectiveness. Even
outside hacking groups, such as G-Force Pakistan, joined forces with the
Palestinians to lend a helping hand. This is increasingly common. Some
outside groups join an effort because they have similar political or
ethnic motivations, however, this is not always the case. Some groups
participate in hacks simply for the desire to hack or the publicity, not
out of a sense of loyalty.

Overall it can be expected that Israeli and Palestinian hackers will be
active whenever a stumbling block appears in the road to possible peace
between the groups. On the other hand, increased hacking might also
occur when the Israelis and Palestinians are close to a peace agreement.
System administrators must remain vigilant and focused on providing
effective network security.

Indian and Pakistani Hackers

Another example is India and Pakistan engaging in a cyber protest caused
by national and ethnic differences. After a cease-fire in the Kashmir
Valley hackers took it upon themselves to continue the hostilities. In
2000, pro-Pakistani hackers defaced more than 500 Indian web sites.
Conversely, only one known Pakistani site was hacked by the Indians.
This illustrates a large difference in technical, hacking abilities or
the willingness to use the skills to strike at an adversary. In this
event the apparent level of sophistication on both sides is relatively
low. Web site defacements are the leading form of this protest. The
group G-Force Pakistan was the most active group claiming involvement in
the events. 10

Japanese Incidents

Recently, Japan has been targeted twice in online protests. During the
first week of April 2001, pro-Korean hackers attacked Japanese
organizations responsible for the approval of a new history textbook.
The textbook glossed over atrocities committed by Japan during World War
II and the occupation of China and South Korea. The perceived reluctance
of Japan to accept responsibility for its actions triggered these
events. The main participants in this incident were Korean university
students, who used e-mail bombs in a DoS attack. The students crashed
several web sites, including Japan's Education Ministry, Liberal
Democratic Party and the publishing company responsible for the
textbook." These attacks were neither long lasting nor were they largely
organized.

In early August 2001, pro-Chinese hackers targeted Japanese web sites
after Japan's Prime Minister visited a controversial war memorial, the
Yasukuni Shrine. In a brief period of time, hackers defaced several web
sites belonging mainly to Japanese companies and research institutes. 12
This indicates the continuing willingness of pro-Chinese hackers to use
cyberspace and hacking tools as a platform for protests and cyber civil
disobedience, as well as for displaying a strong sense of patriotic
nationalism.

Conclusions

While the cyber damage thus far has been minimal, the infrastructure
will certainly be a target of cyber protestors and hacktivists in the
future, with the potential goal being intentional destruction rather
than public embarrassment or purely political statements. Pro-active
network defense and security management are imperative to the prevention
of more serious damage to infrastructure assets. International
cooperation and private-public cooperation within the United States is
necessary to ensure the ongoing function of the critical infrastructure.

FOOTNOTES:

1. Historically, groups have never had the global platform that the
Internet provides today. Bulletin boards and group subscriber lists were
the only computerized links protestors had from the 1970s through the
early 1990s. The introduction of web browsers supporting graphics and
multimedia content and the expansive growth of the Internet, coupled
with the growing number of home computers, gave organizations a new
outlet for distributing information or disrupting events for a political
cause. The fact that many organizations have a web site has enabled them
to spread their beliefs to a wider audience. It has also enabled other
groups to target them for attack.

2. Freedom of speech is a fundamental right protected by the
Constitution of the United States of America that should not be taken
lightly. Individuals and groups generally have the right to actively and
legally support those causes in which they believe. Many protesters and
political activist groups have used cyberspace to organize and advance
their memberships and activities. Using computers and the Internet has
greatly increased protesters' effectiveness in spreading their message
and achieving their goals. This paper deals with past incidents in which
cyber protests have led to the destruction of property and other illegal
activities, citing, specifically, foreign protests.

3. "China-Taiwan Hacker Wars," Jane's Information Group Limited 1999.
Volume 000/2565, 21 October 1999 [online]; available from
<a href="http://www.infowar.com/hacker/99/hack_102199a-j.shtml">http://www.infowar.com/hacker/99/hack_102199a-j.shtml>; 
Internet.

4. Rose Tang, "China-U.S. Cyber War Escalates," 01 May 2001 [online];
available from
<a href="http://www.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers">http://www.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers>;
Internet.

5. "Chinese Hackers Concede Defeat in U.S. Hacker War, Call Cease-fire,"
Agence France Presse, 10 May 2001.

6. This highlights the fact that although web defacements usually cause
minimal damage, they indicate a very serious breach in security. A web
defacement is, by definition, the manipulation of a web server's data by
gaining unauthorized access to that server. It must be determined if the
hacker installed a back door, introduced malicious code, or affected the
server in any other way. A seemingly low-level hack could result in
future problems if systems administrators do not take positive actions
to stop future intrusions and restore the server to its previous
condition.

7. Larisa Paul, "When Cyber Hacktivism Meets Cyberterrorism," Sans
Institute, 19 February 2001 [online]; available from
<a href="http://www.sans.org/infosecFAQ/hackers/terrorism.htm">http://www.sans.org/infosecFAQ/hackers/terrorism.htm>; 
Internet.

8. "Hacktivists Take Conflict to Internet," Associated Press, 4 November
2000.

9. "Hacktivists Take Conflict to Internet," Associated Press, 4 November
2000.

10. Kaajal Wallia, "Indians, Pakistanis Play Patriotic Games on Net,"
The Times of India, 06 January 2001.

11. Stuart McMillan, "Cyber Attackers Remind Japan of its Infamous
Past," The National Business Review, 2001. 04 April 2001 [online];
available from http://www.infowar.com/hacker/01/hack_040501a_j.shtml;
Internet

12. "Chinese Hackers Attack Japanese Web sites over Shrine Visit,"
Agence France Presse, 14 August 2001.

(end text)

(Distributed by the Office of International Information Programs, U.S.
Department of State. Web site: http://usinfo.state.gov)

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST