[iwar] [fc:China.may.be.behind.al.Qaeda.computer.hacking.plot]

From: Fred Cohen (fc@all.net)
Date: 2002-07-04 23:09:42


Return-Path: <sentto-279987-4953-1025849357-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 23:12:08 -0700 (PDT)
Received: (qmail 23394 invoked by uid 510); 5 Jul 2002 06:08:55 -0000
Received: from n20.grp.scd.yahoo.com (66.218.66.76) by all.net with SMTP; 5 Jul 2002 06:08:55 -0000
X-eGroups-Return: sentto-279987-4953-1025849357-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.97] by n20.grp.scd.yahoo.com with NNFMP; 05 Jul 2002 06:09:18 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 5 Jul 2002 06:09:17 -0000
Received: (qmail 98967 invoked from network); 5 Jul 2002 06:09:17 -0000
Received: from unknown (66.218.66.218) by m14.grp.scd.yahoo.com with QMQP; 5 Jul 2002 06:09:17 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 5 Jul 2002 06:09:17 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6569hB21235 for iwar@onelist.com; Thu, 4 Jul 2002 23:09:43 -0700
Message-Id: <200207050609.g6569hB21235@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Jul 2002 23:09:42 -0700 (PDT)
Subject: [iwar] [fc:China.may.be.behind.al.Qaeda.computer.hacking.plot]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

June 28, 2002  China may be behind al Qaeda computer hacking plot
<a href="http://www.insideradvantage.com/stories/2002/jun/28/439189.shtml">http://www.insideradvantage.com/stories/2002/jun/28/439189.shtml>

InsiderAdvantage This week’s reported fears of an al Qaeda-engineered
cyber-attack on American electrical and water utilities are for the most
part unfounded, but the long-term security prognosis is not as rosy
because China may be behind the whole affair, according to high-level
sources with ties to U.S. intelligence and law enforcement.

The Washington Post revealed on June 27 that industry and government
officials have found evidence of a possible al Qaeda plan to use illegal
Internet access to digitally shut down or damage electricity power
plants and transmission grids, or perhaps to open up dams to cause
widespread flooding.

Although the suspected cyber-plot by al Qaeda is believed to have been
discovered while still in its planning stages, IA sources say some
utilities already are believed to be backpedaling from plans to operate
their plants and dams with digitally activated controls. “They’re now
starting to put their money into direct fiber-optics wiring with
soldered connections,” said one industry source. “Most of them are
overreacting,” the source added.

Is there a China connection?

The Post reported that the FBI and the Dept. of Defense have uncovered
evidence that computer prowlers have hacked into the computers of phone
networks, electrical generation and transmission systems, water storage
and distribution systems, nuclear plants, and natural gas facilities.
Attempted attacks on the digital systems that control fire alarms and
pipelines were also apparently tapped into, according to the newspaper.
The location of the hackers reportedly has not been found, but their
electronic pathways to American industries were reportedly channeled
through switching stations in Saudi Arabia, Indonesia, and Pakistan.

The best publicly revealed speculation so far is that al Qaeda is behind
the cyber-snooping. But IA sources say the terrorist group likely has a
state partner in its efforts to remotely attack the U.S., and that
partner is believed to be China.

Based on classified information obtained in late April, IA first
reported the believed China connection to cyber-terrorism. (See “Feds
fear Chinese cyber-attack,’ April 30). Since then, the information news
site World Net Daily has reported similar findings, although to our
knowledge no TV or print journalists have yet made a China connection.

IA continues to investigate.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT