[iwar] [fc:Cyberspace.Braces.For.Escalation.And.War]

From: Fred Cohen (fc@all.net)
Date: 2001-11-29 16:42:26


Return-Path: <sentto-279987-3983-1007080833-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 29 Nov 2001 16:43:10 -0800 (PST)
Received: (qmail 6671 invoked by uid 510); 30 Nov 2001 00:40:55 -0000
Received: from n26.groups.yahoo.com (216.115.96.76) by all.net with SMTP; 30 Nov 2001 00:40:55 -0000
X-eGroups-Return: sentto-279987-3983-1007080833-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.56] by n26.groups.yahoo.com with NNFMP; 30 Nov 2001 00:36:41 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 30 Nov 2001 00:40:33 -0000
Received: (qmail 27739 invoked from network); 30 Nov 2001 00:40:32 -0000
Received: from unknown (216.115.97.171) by m12.grp.snv.yahoo.com with QMQP; 30 Nov 2001 00:40:32 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 30 Nov 2001 00:40:31 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAU0gQD14694 for iwar@onelist.com; Thu, 29 Nov 2001 16:42:26 -0800
Message-Id: <200111300042.fAU0gQD14694@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 29 Nov 2001 16:42:26 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Cyberspace.Braces.For.Escalation.And.War]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Cyberspace Braces For Escalation And War 
By Shawna McAlearney Amid, Information Security, 11/29/2001
<a href="http://www.infosecuritymag.com/current_daily.shtml#cyberspace">http://www.infosecuritymag.com/current_daily.shtml#cyberspace>
 "We still have a system that is fragile, that is vulnerable to
sophisticated attacks," said national cybersecurity advisor Richard
Clarke in published reports. "Not to 14-year-olds, but to a
sophisticated group, or nation-state, with multiple simultaneous
attacks. It could lead to catastrophic damage to the economy, and, if
done at a time of national security crisis, it could lead to
catastrophic damage to our national defense."

According to a Reuters report, "Even as it fights in Afghanistan with
bombs and guns and allies on horseback, the U.S. military is gearing up
to use computers and code as potentially decisive weapons in the next
phases of its campaign. The goal would be to disable air defense
systems, scramble enemy logistics and perhaps infect software through
tactics being honed by a joint task force set up in 1999 under the
Colorado Springs, Colo.-based U.S. Space Command."

Diverse threats have caused varying levels of concern over the last few
years. Cyberthreats range from the defacement of Web sites by bored
teenagers to devastating malware that causes billions of dollars in
damage and lost productivity. Though we have yet to see terrorist
groups--such as Hizbollah, HAMAS, Abu Nidal and Al Qaeda--employ hacking
or malware to target critical infrastructures, their reliance on
information technology and acquisition of computer expertise are clear
warning signs.

While damage caused by hacktivists--and even cyberterrorists--has been
minimal thus far, security experts predict that the nation's IT
infrastructure will certainly be a target in the future. 
Calling cyberterrorism a very real threat, Leslie G. Wiser, Jr., chief
of the training, outreach and strategy section at the National
Infrastructure Protection Center (NIPC) testified before a Congressional
subcommittee in August.

"The prospect of information warfare by foreign militaries against our
critical infrastructures is perhaps the greatest potential cyberthreat
to our national security," said Wiser. "We know that many foreign
nations are developing information warfare doctrine, programs and
capabilities for use against the United States or other nations."

Awareness of the need for increased vigilance predates the Sept. 11
terrorist attacks.

"For attackers, viruses and worms are likely to become more
controllable, precise, and predictable--making them more suitable for
weaponization," Dr. Lawrence Gershwin, national intelligence officer for
science and technology, told the Joint Economic Committee last June.
"Advanced modeling and simulation technologies are likely to assist in
identifying critical nodes for an attack and conducting battle damage
assessments. Most U.S. adversaries have access to the technology needed
to pursue computer network operations."

"For the next 5 to 10 years or so, only nation-states appear to have the
discipline, commitment and resources to fully develop the capabilities
to attack critical infrastructures," testified Gershwin.

In an October report, NIPC said "Cyberprotestors are becoming
increasingly more organized. . .and will certainly target infrastructure
more often and exploit opportunities to disrupt or damage it."

"Cyberattacks against the Afghan region are just a new target," says
Jason Wright, an industry analyst at Frost and Sullivan. "Before that it
was just rebels without a cause, hacking at will. But now there is
political motivation behind it."

The hacking group Young Intelligent Hackers Against Terrorism (YIHAT)
was formed in the wake of the Sept. 11 terrorist attacks--and has been
fighting with Pakistani hacker group Gforce ever since. The groups
appear to vie with one another for the most enemy sites defaced in the
name of their "cause."

However, some sites are falling victim to misguided hacktivists. A Web
site for the government of the Islamic State of Afghanistan was hacked
and forced offline with a flood of hate messages from hacktivists who
didn't note that it's an opponent of the Taliban regime.

And hacktivism isn't limited to the parties directly involved in the
conflict. Within days of the first U.S. air strikes on Afghanistan,
pro-Taliban Pakistanis defaced a number of Indian government computers,
posting messages in support of terrorist leader Osama bin Laden and his
Al Qaeda network.

<a href="http://www.fbi.gov/congress/congress01/wiser082901.htm">http://www.fbi.gov/congress/congress01/wiser082901.htm>
<a href="http://www.nipc.gov/warnings/advisories/2001/01-026.htm">http://www.nipc.gov/warnings/advisories/2001/01-026.htm>
<a href="http://www.nipc.gov/publications/highlights/2001/highlight-01-10.pdf">http://www.nipc.gov/publications/highlights/2001/highlight-01-10.pdf>
<a href="http://www.nipc.gov/publications/nipcpub/cyberprotests.pdf">http://www.nipc.gov/publications/nipcpub/cyberprotests.pdf>

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST