Return-Path: <sentto-279987-4929-1025372627-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 29 Jun 2002 10:46:10 -0700 (PDT) Received: (qmail 30396 invoked by uid 510); 29 Jun 2002 17:43:33 -0000 Received: from n17.grp.scd.yahoo.com (66.218.66.72) by all.net with SMTP; 29 Jun 2002 17:43:33 -0000 X-eGroups-Return: sentto-279987-4929-1025372627-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.197] by n17.grp.scd.yahoo.com with NNFMP; 29 Jun 2002 17:43:47 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 29 Jun 2002 17:43:47 -0000 Received: (qmail 51504 invoked from network); 29 Jun 2002 17:43:47 -0000 Received: from unknown (66.218.66.217) by m4.grp.scd.yahoo.com with QMQP; 29 Jun 2002 17:43:47 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 29 Jun 2002 17:43:46 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5THjDt26560 for iwar@onelist.com; Sat, 29 Jun 2002 10:45:13 -0700 Message-Id: <200206291745.g5THjDt26560@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 29 Jun 2002 10:45:12 -0700 (PDT) Subject: [iwar] [fc:US.fears.al-Qaida.hackers.will.hit.vital.computer.networks] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: *** US fears al-Qaida hackers will hit vital computer networks <a href="http://www.guardian.co.uk/Archive/Article/0,4273,4450242,00.html">http://www.guardian.co.uk/Archive/Article/0,4273,4450242,00.html> Julian Borger in Washington Guardian Friday June 28, 2002 The al-Qaida terrorist network has been making preparations for potentially devastating attacks on America by hacking into computer networks to look for ways to disrupt electricity and telephone systems, dams and nuclear power stations, it was claimed yesterday. Government officials said the terrorist group appeared to be far more sophisticated than initially thought in its use of the internet as a weapon to disrupt America's web-based economy and cause potentially catastrophic physical damage by opening dam floodgates or blacking out air traffic control systems. US investigators tracing the footprints of al-Qaida members on the internet told yesterday's Washington Post that they have spent time on sites that not only provide hacking tips but offer software that helps users access supposedly secure networks and take over control of specialised digital switches used for remote control of public utilities. After September 11, US cyber-warfare experts also found that users on Saudi, Indonesian and Pakistani servers had been studying US computer systems governing emergency phone systems, power stations, dams, reservoirs, water pipelines, nuclear power plants and gas storage facilities. "We were underestimating the amount of attention [al-Qaida was] paying to the internet," Roger Cressey, the chief of staff of the White House critical infrastructure protection board, told the Post. "Al-Qaida spent more time mapping our vulnerabilities in cyberspace than we previously thought. The question is a question of when, not if." A computer found by American forces in one of al-Qaida's Kabul offices contained a virtual model of a dam, based on engineering software which allows the programmer to simulate a catastrophic breach. There was also software which could predict the course of floodwaters if a dam collapsed. Government officials did not say whether the al-Qaida programmers appeared to have a specific dam in mind. Dams have already been shown to be vulnerable to cyber attack. In 1998, a 12-year-old hacked into the computer system of the huge Roosevelt Dam on the Salt River in Arizona, apparently unaware that he could have opened the dam's floodgates. Any resulting flood would have swept through the cities of Mesa and Tempe, with a combined population of nearly a million, and threatened Phoenix. The defence of the country's civil internet networks is the task of the FBI's national infrastructure protection centre, set up in 1998. The Pentagon's cyber-defences are controlled by its space command, which established a computer network defence joint taskforce four years ago. The principal threats then were seen as China and Russia. But a CIA directorate of intelligence memorandum issued in February identified al-Qaida as a significant cyber-threat, saying that Osama bin Laden's organisation had shown "far more interest" in cyber-terrorism than previously thought. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:33 PDT