[iwar] [fc:Cyberspace.full.of.terror.targets]

From: Fred Cohen (fc@all.net)
Date: 2002-05-06 18:50:53


Return-Path: <sentto-279987-4644-1020736218-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 06 May 2002 21:26:09 -0700 (PDT)
Received: (qmail 12348 invoked by uid 510); 7 May 2002 04:21:08 -0000
Received: from n15.grp.scd.yahoo.com (66.218.66.70) by all.net with SMTP; 7 May 2002 04:21:08 -0000
X-eGroups-Return: sentto-279987-4644-1020736218-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.197] by n15.grp.scd.yahoo.com with NNFMP; 07 May 2002 01:50:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 7 May 2002 01:50:18 -0000
Received: (qmail 75548 invoked from network); 7 May 2002 01:50:18 -0000
Received: from unknown (66.218.66.216) by m4.grp.scd.yahoo.com with QMQP; 7 May 2002 01:50:18 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 7 May 2002 01:50:18 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g471orm22688 for iwar@onelist.com; Mon, 6 May 2002 18:50:53 -0700
Message-Id: <200205070150.g471orm22688@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 6 May 2002 18:50:53 -0700 (PDT)
Subject: [iwar] [fc:Cyberspace.full.of.terror.targets]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Cyberspace full of terror targets

By Tom Squitieri, USA TODAY, 5/5/02
<a href="http://www.usatoday.com/life/cyber/tech/2002/05/06/cyber-terror.htm">http://www.usatoday.com/life/cyber/tech/2002/05/06/cyber-terror.htm>

Government and private computer networks are facing new threats of
terrorist attacks, ranging from an attempt to bring havoc to a major
city to nationwide disruptions of finances, transportation and
utilities. But people with knowledge of national intelligence briefings
say little has been done to protect against a cyberattack.

Some of the threats come from individuals who might have connections to
Osama bin Laden's al-Qaeda network in Pakistan and elsewhere, those who
have been briefed say.

The specific threats, in part, prompted a meeting April 18 of government
intelligence and information-technology officials to discuss protecting
the nation's computer networks.

"This threat is growing," Sen. Jon Kyl, R-Ariz., says. "It's a big
threat, because it is easy to do and can cause great harm."

Congress is trying to reduce the threat. Legislation has been proposed
to create a national "cybersecurity defense team" to identify areas most
vulnerable to attack and determine how to reduce the danger.

Other legislation would make it easier for companies to share
information without being subject to antitrust or freedom-of-information
laws. Such communication could alert the government to a terrorist
attack, as opposed to more common cases of computer hackers targeting a
company or agency. It could also help companies defend against attacks.

The vast array of potential targets and the lack of adequate safeguards
have made addressing the threat daunting. Among the recent targets that
terrorists have discussed, according to people with knowledge of
intelligence briefings:

The Centers for Disease Control and Prevention, based in Atlanta. It is
charged with developing the nation's response to potential attacks
involving biological warfare.  The nation's financial network, which
could shut down the flow of banking data. The attack would focus on the
FedWire, the money-movement clearing system maintained by the Federal
Reserve Board.  Computer systems that operate water-treatment plants,
which could contaminate water supplies.  Computer networks that run
electrical grids and dams.  As many targets as possible in a major city.
Los Angeles and San Francisco have been mentioned by terrorists,
intelligence officials say.  Facilities that control the flow of
information over the Internet. Richard Clarke, the White House special
adviser on cybersecurity, says such sites, of which there are 20 to 25,
are "only secure in their obscurity."  The nation's communications
network, including telephone and 911 call centers.  Air traffic control,
rail and public transportation systems. 
Officials are most concerned that a cyberattack could be coupled with a
conventional terrorist attack, such as those on Sept. 11, and hinder
rescue efforts.

"Cyberterrorism presents a real and growing threat to American
security," says Rep. Jane Harman, D-Calif., top Democrat on the House
Intelligence Committee's panel on terrorism and homeland security. "What
I fear is the combination of a cyberattack coordinated with more
traditional terrorism, undermining our ability to respond to an attack
when lives are in danger."

The Bush administration is seeking about $4.5 billion in its 2003 budget
request to protect federal computer systems. That's about 8% of its
information technology budget.

Clarke warned lawmakers earlier this year that the threat of a
cyberattack was greater than previously imagined. He says it could take
three or four years to markedly improve the government's ability to
prevent such attacks.

Long before Sept. 11, officials warned of the nation's vulnerability to
cyberattack. The Pentagon and many large companies have experienced
limited attacks. Hackers calling themselves the "Deceptive Duo" recently
infiltrated Pentagon computers and left a message indicating that the
attacks were made to show "how sad our cyber-security really is."

In 2001, cyberattacks caused $12 billion in damage and economic losses.

Such attacks were successful in penetrating security systems at an
airport in Massachusetts and a dam in Arizona, causing shutdowns of both
facilities but no loss of lives or long-term damage.

"The principal myth that you will hear is that nobody can actually
change the operation of a physical system through computers," says Alan
Paller, director of the System Administration, Networking and Security
Institute, which teaches people how to protect computer systems. "There
have been people who have already demonstrated how that can be done."

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT