Return-Path: <sentto-279987-3983-1007080833-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 29 Nov 2001 16:43:10 -0800 (PST) Received: (qmail 6671 invoked by uid 510); 30 Nov 2001 00:40:55 -0000 Received: from n26.groups.yahoo.com (216.115.96.76) by all.net with SMTP; 30 Nov 2001 00:40:55 -0000 X-eGroups-Return: sentto-279987-3983-1007080833-fc=all.net@returns.groups.yahoo.com Received: from [10.1.4.56] by n26.groups.yahoo.com with NNFMP; 30 Nov 2001 00:36:41 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 30 Nov 2001 00:40:33 -0000 Received: (qmail 27739 invoked from network); 30 Nov 2001 00:40:32 -0000 Received: from unknown (216.115.97.171) by m12.grp.snv.yahoo.com with QMQP; 30 Nov 2001 00:40:32 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 30 Nov 2001 00:40:31 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAU0gQD14694 for iwar@onelist.com; Thu, 29 Nov 2001 16:42:26 -0800 Message-Id: <200111300042.fAU0gQD14694@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 29 Nov 2001 16:42:26 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Cyberspace.Braces.For.Escalation.And.War] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cyberspace Braces For Escalation And War By Shawna McAlearney Amid, Information Security, 11/29/2001 <a href="http://www.infosecuritymag.com/current_daily.shtml#cyberspace">http://www.infosecuritymag.com/current_daily.shtml#cyberspace> "We still have a system that is fragile, that is vulnerable to sophisticated attacks," said national cybersecurity advisor Richard Clarke in published reports. "Not to 14-year-olds, but to a sophisticated group, or nation-state, with multiple simultaneous attacks. It could lead to catastrophic damage to the economy, and, if done at a time of national security crisis, it could lead to catastrophic damage to our national defense." According to a Reuters report, "Even as it fights in Afghanistan with bombs and guns and allies on horseback, the U.S. military is gearing up to use computers and code as potentially decisive weapons in the next phases of its campaign. The goal would be to disable air defense systems, scramble enemy logistics and perhaps infect software through tactics being honed by a joint task force set up in 1999 under the Colorado Springs, Colo.-based U.S. Space Command." Diverse threats have caused varying levels of concern over the last few years. Cyberthreats range from the defacement of Web sites by bored teenagers to devastating malware that causes billions of dollars in damage and lost productivity. Though we have yet to see terrorist groups--such as Hizbollah, HAMAS, Abu Nidal and Al Qaeda--employ hacking or malware to target critical infrastructures, their reliance on information technology and acquisition of computer expertise are clear warning signs. While damage caused by hacktivists--and even cyberterrorists--has been minimal thus far, security experts predict that the nation's IT infrastructure will certainly be a target in the future. Calling cyberterrorism a very real threat, Leslie G. Wiser, Jr., chief of the training, outreach and strategy section at the National Infrastructure Protection Center (NIPC) testified before a Congressional subcommittee in August. "The prospect of information warfare by foreign militaries against our critical infrastructures is perhaps the greatest potential cyberthreat to our national security," said Wiser. "We know that many foreign nations are developing information warfare doctrine, programs and capabilities for use against the United States or other nations." Awareness of the need for increased vigilance predates the Sept. 11 terrorist attacks. "For attackers, viruses and worms are likely to become more controllable, precise, and predictable--making them more suitable for weaponization," Dr. Lawrence Gershwin, national intelligence officer for science and technology, told the Joint Economic Committee last June. "Advanced modeling and simulation technologies are likely to assist in identifying critical nodes for an attack and conducting battle damage assessments. Most U.S. adversaries have access to the technology needed to pursue computer network operations." "For the next 5 to 10 years or so, only nation-states appear to have the discipline, commitment and resources to fully develop the capabilities to attack critical infrastructures," testified Gershwin. In an October report, NIPC said "Cyberprotestors are becoming increasingly more organized. . .and will certainly target infrastructure more often and exploit opportunities to disrupt or damage it." "Cyberattacks against the Afghan region are just a new target," says Jason Wright, an industry analyst at Frost and Sullivan. "Before that it was just rebels without a cause, hacking at will. But now there is political motivation behind it." The hacking group Young Intelligent Hackers Against Terrorism (YIHAT) was formed in the wake of the Sept. 11 terrorist attacks--and has been fighting with Pakistani hacker group Gforce ever since. The groups appear to vie with one another for the most enemy sites defaced in the name of their "cause." However, some sites are falling victim to misguided hacktivists. A Web site for the government of the Islamic State of Afghanistan was hacked and forced offline with a flood of hate messages from hacktivists who didn't note that it's an opponent of the Taliban regime. And hacktivism isn't limited to the parties directly involved in the conflict. Within days of the first U.S. air strikes on Afghanistan, pro-Taliban Pakistanis defaced a number of Indian government computers, posting messages in support of terrorist leader Osama bin Laden and his Al Qaeda network. <a href="http://www.fbi.gov/congress/congress01/wiser082901.htm">http://www.fbi.gov/congress/congress01/wiser082901.htm> <a href="http://www.nipc.gov/warnings/advisories/2001/01-026.htm">http://www.nipc.gov/warnings/advisories/2001/01-026.htm> <a href="http://www.nipc.gov/publications/highlights/2001/highlight-01-10.pdf">http://www.nipc.gov/publications/highlights/2001/highlight-01-10.pdf> <a href="http://www.nipc.gov/publications/nipcpub/cyberprotests.pdf">http://www.nipc.gov/publications/nipcpub/cyberprotests.pdf> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST