Worries of Cyberattacks on U.S. Are Aired

From: alerts@theMezz.com
Date: 2002-04-28 19:30:39


Return-Path: <cybercrime-alerts-bounce@freelists.org>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 28 Apr 2002 19:32:07 -0700 (PDT)
Received: (qmail 27308 invoked by uid 510); 29 Apr 2002 02:27:18 -0000
Received: from freelists-180.iquest.net (HELO turing.freelists.org) (206.53.239.180) by all.net with SMTP; 29 Apr 2002 02:27:18 -0000
Received: from turing.(none) (localhost [127.0.0.1]) by turing.freelists.org (FreeLists Mail Multiplex) with ESMTP id 200AC942FA; Sun, 28 Apr 2002 21:22:36 -0500 (EST)
Received: with ECARTIS (v1.0.0; list cybercrime-alerts); Sun, 28 Apr 2002 21:20:42 -0500 (EST)
Delivered-To: cybercrime-alerts@freelists.org
Received: from asgard.domainnameservers.net (asgard.domainnameservers.net [208.165.79.11]) by turing.freelists.org (FreeLists Mail Multiplex) with ESMTP id 4E1E09414C for <cybercrime-alerts@freelists.org>; Sun, 28 Apr 2002 21:20:41 -0500 (EST)
Received: from bigmezz (pool-129-44-206-49.syr.east.verizon.net [129.44.206.49]) by asgard.domainnameservers.net (8.11.6/8.11.6) with ESMTP id g3T2Pr384121 for <cybercrime-alerts@freelists.org>; Sun, 28 Apr 2002 22:25:53 -0400 (EDT) (envelope-from alerts@theMezz.com)
Message-ID: <200204282230390260.0008F8E4@themezz.com>
X-Mailer: Calypso Version 3.30.00.00 (3)
Date: Sun, 28 Apr 2002 22:30:39 -0400
From: alerts@theMezz.com
To: cybercrime-alerts@freelists.org
Subject: Worries of Cyberattacks on U.S. Are Aired
Content-type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-archive-position: 9
X-ecartis-version: Ecartis v1.0.0
Sender: cybercrime-alerts-bounce@freelists.org
Errors-To: cybercrime-alerts-bounce@freelists.org
X-original-sender: alerts@theMezz.com
Precedence: normal
Reply-To: cybercrime-alerts@freelists.org
X-list: cybercrime-alerts

* this message via http://techPolice.com *


  
Worries of Cyberattacks on U.S. Are Aired
Chinese Military Is Looking for Ways; Students Seen Gearing Up for=
 Disruptions 

By Bill Miller
Washington Post Staff Writer
Friday, April 26, 2002; Page A26 

U.S. officials warned yesterday that the Chinese military may be searching=
 for ways to attack defense and civilian computer networks in the United=
 States and Taiwan. But they said intelligence analysts have concluded that=
 China so far lacks the ability to cause much disruption.

The assessment was included in a classified report recently issued by the=
 CIA that also warned of a more immediate cybersecurity concern involving=
 Chinese students.

Although the Chinese military cannot yet disrupt key computer systems, "you=
 have to be mindful of it and concerned they might have that goal," a U.S.=
 government official said yesterday. "The Chinese themselves have=
 acknowledged, in their own press, their interest."

But Chinese students could be planning a series of cyberattacks against=
 U.S. government and business Web sites during the next several weeks; it's=
 similar to widespread hacking that took place a year ago after the=
 collision of a U.S. Navy surveillance aircraft and a Chinese jet fighter=
 over the South China Sea, said the official, who asked not to be=
 identified. 

There is no evidence tying those "harassment" activities to the Chinese=
 military, the official said.

In the past, students have used Chinese servers to spread computer viruses=
 and deface or overwhelm U.S. Web sites, the official said. 

With spring break coming up, and the passing of the anniversary of the air=
 collision, authorities believe Chinese students are gearing up for a wave=
 of attacks to spread political messages, the official said.

The CIA recently issued the classified report warning government=
 policymakers, the Defense Department, U.S. diplomats and law enforcement=
 agencies to watch for Chinese student hackers trying to spread computer=
 viruses or deface Internet sites.

The same report included an assessment that the Chinese government lacks=
 the ability to "carry out its intended goal" of disrupting Taiwanese=
 computer systems or U.S. military logistics, according to a source=
 familiar with the findings. The report and its contents were first made=
 public yesterday by the Los Angeles Times.

A CIA spokesman said the agency does not comment on intelligence reports.=
 Officials at the Chinese Embassy in Washington did not return telephone=
 messages seeking comment.

Toshi Yoshihara, a research fellow with the Institute for Foreign Policy=
 Analysts, said the Chinese military views cyberwarfare as "a way to=
 overcome America's military superiority" and a means to keep the United=
 States from interfering in any conflict with Taiwan, or to at least=
 disrupt U.S. military communications in the early stages of a battle.

Yoshihara, a specialist on China's military and China-Taiwan relations,=
 said that developing the ability to disable military and civilian computer=
 systems is important to the Chinese because it fits a "strategy of winning=
 without fighting, at minimal cost." He said cyberattacks carry with them=
 the element of surprise and can alarm the public.

Although Pentagon and CIA officials and scholars have been monitoring=
 developments for years, Yoshihara said it is difficult to gauge China's=
 technological capacity because of its military secrecy.

"We frankly know very little about what the Chinese have been developing in=
 recent years," he said. "We should remain vigilant."


 www.washingtonpost.com/wp-dyn/articles/A50900-2002Apr25.html



--
This was sent to you from http://theMezz.com
To Subscribe/Unsubscribe go to http://techPolice.com


 


--This communication is confidential to the parties it is intended to serve--
Fred Cohen		Fred Cohen & Associates.........tel/fax:925-454-0171
fc@all.net		The University of New Haven.....http://www.unhca.com/
http://all.net/		Sandia National Laboratories....tel:925-294-2087


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT