Return-Path: <cybercrime-alerts-bounce@freelists.org> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 28 Apr 2002 19:32:07 -0700 (PDT) Received: (qmail 27308 invoked by uid 510); 29 Apr 2002 02:27:18 -0000 Received: from freelists-180.iquest.net (HELO turing.freelists.org) (206.53.239.180) by all.net with SMTP; 29 Apr 2002 02:27:18 -0000 Received: from turing.(none) (localhost [127.0.0.1]) by turing.freelists.org (FreeLists Mail Multiplex) with ESMTP id 200AC942FA; Sun, 28 Apr 2002 21:22:36 -0500 (EST) Received: with ECARTIS (v1.0.0; list cybercrime-alerts); Sun, 28 Apr 2002 21:20:42 -0500 (EST) Delivered-To: cybercrime-alerts@freelists.org Received: from asgard.domainnameservers.net (asgard.domainnameservers.net [208.165.79.11]) by turing.freelists.org (FreeLists Mail Multiplex) with ESMTP id 4E1E09414C for <cybercrime-alerts@freelists.org>; Sun, 28 Apr 2002 21:20:41 -0500 (EST) Received: from bigmezz (pool-129-44-206-49.syr.east.verizon.net [129.44.206.49]) by asgard.domainnameservers.net (8.11.6/8.11.6) with ESMTP id g3T2Pr384121 for <cybercrime-alerts@freelists.org>; Sun, 28 Apr 2002 22:25:53 -0400 (EDT) (envelope-from alerts@theMezz.com) Message-ID: <200204282230390260.0008F8E4@themezz.com> X-Mailer: Calypso Version 3.30.00.00 (3) Date: Sun, 28 Apr 2002 22:30:39 -0400 From: alerts@theMezz.com To: cybercrime-alerts@freelists.org Subject: Worries of Cyberattacks on U.S. Are Aired Content-type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-archive-position: 9 X-ecartis-version: Ecartis v1.0.0 Sender: cybercrime-alerts-bounce@freelists.org Errors-To: cybercrime-alerts-bounce@freelists.org X-original-sender: alerts@theMezz.com Precedence: normal Reply-To: cybercrime-alerts@freelists.org X-list: cybercrime-alerts * this message via http://techPolice.com * Worries of Cyberattacks on U.S. Are Aired Chinese Military Is Looking for Ways; Students Seen Gearing Up for= Disruptions By Bill Miller Washington Post Staff Writer Friday, April 26, 2002; Page A26 U.S. officials warned yesterday that the Chinese military may be searching= for ways to attack defense and civilian computer networks in the United= States and Taiwan. But they said intelligence analysts have concluded that= China so far lacks the ability to cause much disruption. The assessment was included in a classified report recently issued by the= CIA that also warned of a more immediate cybersecurity concern involving= Chinese students. Although the Chinese military cannot yet disrupt key computer systems, "you= have to be mindful of it and concerned they might have that goal," a U.S.= government official said yesterday. "The Chinese themselves have= acknowledged, in their own press, their interest." But Chinese students could be planning a series of cyberattacks against= U.S. government and business Web sites during the next several weeks; it's= similar to widespread hacking that took place a year ago after the= collision of a U.S. Navy surveillance aircraft and a Chinese jet fighter= over the South China Sea, said the official, who asked not to be= identified. There is no evidence tying those "harassment" activities to the Chinese= military, the official said. In the past, students have used Chinese servers to spread computer viruses= and deface or overwhelm U.S. Web sites, the official said. With spring break coming up, and the passing of the anniversary of the air= collision, authorities believe Chinese students are gearing up for a wave= of attacks to spread political messages, the official said. The CIA recently issued the classified report warning government= policymakers, the Defense Department, U.S. diplomats and law enforcement= agencies to watch for Chinese student hackers trying to spread computer= viruses or deface Internet sites. The same report included an assessment that the Chinese government lacks= the ability to "carry out its intended goal" of disrupting Taiwanese= computer systems or U.S. military logistics, according to a source= familiar with the findings. The report and its contents were first made= public yesterday by the Los Angeles Times. A CIA spokesman said the agency does not comment on intelligence reports.= Officials at the Chinese Embassy in Washington did not return telephone= messages seeking comment. Toshi Yoshihara, a research fellow with the Institute for Foreign Policy= Analysts, said the Chinese military views cyberwarfare as "a way to= overcome America's military superiority" and a means to keep the United= States from interfering in any conflict with Taiwan, or to at least= disrupt U.S. military communications in the early stages of a battle. Yoshihara, a specialist on China's military and China-Taiwan relations,= said that developing the ability to disable military and civilian computer= systems is important to the Chinese because it fits a "strategy of winning= without fighting, at minimal cost." He said cyberattacks carry with them= the element of surprise and can alarm the public. Although Pentagon and CIA officials and scholars have been monitoring= developments for years, Yoshihara said it is difficult to gauge China's= technological capacity because of its military secrecy. "We frankly know very little about what the Chinese have been developing in= recent years," he said. "We should remain vigilant." www.washingtonpost.com/wp-dyn/articles/A50900-2002Apr25.html -- This was sent to you from http://theMezz.com To Subscribe/Unsubscribe go to http://techPolice.com --This communication is confidential to the parties it is intended to serve-- Fred Cohen Fred Cohen & Associates.........tel/fax:925-454-0171 fc@all.net The University of New Haven.....http://www.unhca.com/ http://all.net/ Sandia National Laboratories....tel:925-294-2087 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tied to your PC? Cut Loose and Stay connected with Yahoo! Mobile http://us.click.yahoo.com/QBCcSD/o1CEAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT