[iwar] [fc:Web.Wary:.casing.of.sites]

From: Fred Cohen (fc@all.net)
Date: 2002-06-29 10:43:47


Return-Path: <sentto-279987-4928-1025372540-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 29 Jun 2002 10:46:09 -0700 (PDT)
Received: (qmail 30351 invoked by uid 510); 29 Jun 2002 17:42:08 -0000
Received: from n19.grp.scd.yahoo.com (66.218.66.74) by all.net with SMTP; 29 Jun 2002 17:42:08 -0000
X-eGroups-Return: sentto-279987-4928-1025372540-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.201] by n19.grp.scd.yahoo.com with NNFMP; 29 Jun 2002 17:42:22 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 29 Jun 2002 17:42:20 -0000
Received: (qmail 3964 invoked from network); 29 Jun 2002 17:42:20 -0000
Received: from unknown (66.218.66.218) by m9.grp.scd.yahoo.com with QMQP; 29 Jun 2002 17:42:20 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 29 Jun 2002 17:42:21 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5THhlD26519 for iwar@onelist.com; Sat, 29 Jun 2002 10:43:47 -0700
Message-Id: <200206291743.g5THhlD26519@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 29 Jun 2002 10:43:47 -0700 (PDT)
Subject: [iwar] [fc:Web.Wary:.casing.of.sites]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit
X-Spam-Status: No, hits=2.0 required=5.0 tests=GAPPY_TEXT,RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: **

Web Wary:  casing of sites

<a href="http://abcnews.go.com/sections/world/DailyNews/qaeda020627_internet.html">http://abcnews.go.com/sections/world/DailyNews/qaeda020627_internet.html>



Experts fear al Qaeda may be refining its cyber-skills in preparation
for a new kind of terrorist attack on the United States. (PhotoDisc)
Web Wary Report: U.S. Fears Possible Al Qaeda Cyber-Attacks

W A S H I N G T O N, June 27 — U.S. government experts, wary of al
Qaeda's skills on the Internet, are concerned that Osama bin Laden's
guerrilla network may be planning cyber-attacks targeting nuclear power
plants, dams or other critical structures, The Washington Post reported
today.


An FBI investigation of suspicious surveillance of key computers
discovered "multiple casings of sites" nationwide, the report said,
citing a U.S. Defense Department summary of the probe.

Routed through telecommunications switches in Saudi Arabia, Indonesia
and Pakistan, the visitors studied emergency telephone systems,
electrical generation and transmission, water storage and distribution,
nuclear power plants and gas facilities, the Post said.

U.S. officials said some of the mysterious computer probes targeted a
class of digital devices that allow remote control of such things as
fire dispatch services and pipelines, the newspaper said.

U.S. law enforcement and national security officials cited by the Post
said information about those devices, including how to program them,
turned up on al Qaeda computers seized in January by U.S. forces in
Afghanistan.

Models of a Dam

A computer taken from an al Qaeda office contained models of a dam, made
with structural architecture and engineering software, that enabled the
planners to simulate its catastrophic failure.

Bush administration officials declined to say whether they had
identified a specific dam as a possible target, the newspaper said.

U.S. investigators also have found evidence in the logs that mark a
browser's path through the Internet that al Qaeda operators spent time
on sites that offer software and programming instructions for the
digital switches that run power, water, transport and communications
grids, the Post reported.

The newspaper also said some al Qaeda prisoners have told interrogators
about intentions, in general terms, to use those tools.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:33 PDT